Careers Information Security Podcast show

Careers Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Russian-Speaking Ransomware Gangs Hit New Victim: Russians | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how Russian-speaking ransomware gangs have their eyes on a new target, offers the latest on Australia's data security reckoning and the government’s response, and outlines emerging trends in customer identity and access management.

 Examining the Effects of Cyberattacks on Patient Care | File Type: audio/mpeg | Duration: Unknown

Cyberattacks on healthcare entities result in poor patient outcomes, including delayed procedures and even a rise in mortality, according to a recent survey conducted by research firm the Ponemon Institute. Ryan Witt of Proofpoint, which sponsored the study, discusses the findings.

 Online Tracking Tools Provoke Patient Privacy Concerns | File Type: audio/mpeg | Duration: Unknown

A study by data privacy firm Lokker found thousands of healthcare providers deploying Facebook Pixel and other similar tracking tools. Those trackers reveal "medical and other data that consumers don't know is being tracked and haven't authorized," says Ian Cohen, Lokker's chief executive officer.

 Top Cyber Lessons From Natural Disaster Plans in Healthcare | File Type: audio/mpeg | Duration: Unknown

Plan for a ransomware attack the same way you plan for a hurricane, says Paige Peterson Sconzo, director of healthcare services at security firm Redacted Inc. A cyber incident capable of disrupting network connectivity requires careful thinking about how to revert to the pre-internet era.

 Most Concerning Security Vulnerabilities in Medical Devices | File Type: audio/mpeg | Duration: Unknown

Security flaws in a vital signs monitoring device from a China-based manufacturer could allow hackers to launch an attack that spreads to all other devices connected to the same network. This is among the most serious security issues involving medical devices, says Jason Sinchak of Level Nine.

 Yotam Segev on What Distinguishes Cyera From Traditional DLP | File Type: audio/mpeg | Duration: Unknown

CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.

 The Growing Zelle Fraud Problem and Who Should Pay for It | File Type: audio/mpeg | Duration: Unknown

The latest ISMG Security Report examines whether banks should be held liable for the rapidly increasing Zelle fraud problem, explores the latest M&A activity among IAM vendors, and discusses the implications of the new legal framework for personal data transfers between the U.S. and Europe.

 The Challenges of Kubernetes and Cloud Containers | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," as the use of Kubernetes and cloud containers over traditional forms of storage continues to increase, Nikki Robinson of IBM discusses the benefits of breaking down "complicated environments into something that's tangible and easy to manage."

 How Adversaries Are Bypassing Weak MFA | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how adversaries have a new favorite tactic to circumvent MFA, why vendor Akamai is an appealing target for private equity, and what the industry can do differently to attract more females to leadership roles.

 How to Deal With Endemic Software Vulnerabilities | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Amit Shah, director of product marketing at Dynatrace, discusses the implications of the Log4Shell software vulnerability and the need for organizations to take an observability-led approach to software development and security going forward.

 Passwords Are Unfit - So Why Do We Still Have Them? | File Type: audio/mpeg | Duration: Unknown

Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.

 Cyberwar: Assessing the Geopolitical Playing Field | File Type: audio/mpeg | Duration: Unknown

The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of Traceable.ai discuss what the U.S. government and companies need to do to win this cyberwar.

 Examining What Went Wrong for Optus | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.

 It's 2022. Do You Know Where Your Old Hard Drives Are? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses financial giant Morgan Stanley's failure to invest in proper hard drive destruction oversight, the future of ransomware and the gangs that have attacked organizations in recent years, and the methods required to secure new payments systems.

 Analyzing Twitter's Security Nightmare | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses the appearance at a Senate hearing this week by the former head of security for Twitter; the top-performing web application and API protection vendors, according to Gartner's Magic Quadrant 2022; and threat trends to watch for in 2023.

Comments

Login or signup comment.