Careers Information Security Podcast show

Careers Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Behind Agency Doors: Where Is Security Progress Being Made? | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," U.S. Air Force Chief Software Officer Nicolas M. Chaillan, a former DHS and DOD adviser, shares his opinions about the government's handling of DevSecOps and cybersecurity, where progress is being made and where more work needs to be done.

 Vulnerabilities Identified in Baxter Infusion Pump Devices | File Type: audio/mpeg | Duration: Unknown

Vulnerabilities in certain medication infusion pump products from manufacturer Baxter could compromise a hospital's biomedical network. The flaws highlight the risks involving the acquisition and disposal of medical technology, says researcher Deral Heiland of Rapid7.

 Protecting Industrial Security When Uptime Is Essential | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Mark Cristiano of Rockwell Automation discusses Rockwell's cybersecurity journey, the particular challenges of deploying cybersecurity in an OT environment, and the minimum and proper industrial protections that organizations need to have in place.

 EvilProxy Bypasses MFA by Capturing Session Cookies | File Type: audio/mpeg | Duration: Unknown

The latest ISMG Security Report discusses a new phishing-as-a-service toolkit designed to bypass multifactor authentication, the decision by Lloyd's of London to exclude nation-state attacks from cyber insurance policies, and challenges at Okta after it acquired customer identity giant Auth0.

 Overcoming Zero Trust Obstacles in Healthcare | File Type: audio/mpeg | Duration: Unknown

The sheer number of connected devices in healthcare environments is one of the top challenges healthcare entities face in adopting a zero trust approach to cybersecurity, says Zachary Martin, senior adviser at law firm Venable. He discusses the obstacles to achieving zero trust in healthcare.

 Banning Ransoms: The Evolving State of Ransomware Response | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report explores the possible unintended consequences of banning ransom payments, the challenges of opening a cyber intel firm during wartime, and the need for more clarity in the regulation of cryptocurrency firms.

 Reducing Risks by Optimizing Your Cybersecurity Workflow | File Type: audio/mpeg | Duration: Unknown

CISOs have enough tools to identify security weaknesses, says Yoran Sirkis, but they need a way to make the information those tools gather more accessible and to streamline the remediation process. The CEO of Seemplicity discusses how its platform can help security leaders manage remediations.

 Addressing Security Risks of Mounting Legacy Health Data | File Type: audio/mpeg | Duration: Unknown

In many healthcare entities, the amount of data that is being generated and retained continues to grow - and that mounting trove of legacy data is often never disposed, expanding the surface for cyberattacks and other compromises, says Matthew Bernstein of consulting firm Bernstein Data.

 Are Ransomware-as-a-Service Groups in Decline? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how ransomware-as-a-service groups are shifting their business models, how investigators battling cybercrime have been hindered by GDPR, and how employees consider workplace "choice" a key factor for job satisfaction.

 Paul Martini of iboss on the Mainstream Market Embracing SSE | File Type: audio/mpeg | Duration: Unknown

Implementation of security service edge technology has progressed over the past six months from early adopters to mainstream organizations, with requests for proposals around SSE projects now carrying tight deadlines rather than no deadline at all, says iboss co-founder and CEO Paul Martini.

 The Complexity of Managing Medical Device Security Risk | File Type: audio/mpeg | Duration: Unknown

The extremely diverse architectures and systems within the tens of thousands of very specialized types of medical devices used in clinical settings adds to the complexity healthcare organizations and manufacturers face in managing cybersecurity risk for these products, says Phil Englert of H-ISAC.

 Obsidian's Hasan Imam on Spotting SaaS App Vulnerabilities | File Type: audio/mpeg | Duration: Unknown

Obsidian Security has in recent months invested in giving enterprises more visibility into how their SaaS applications are talking to other SaaS applications so that supply chain compromise can be more easily detected and thwarted, according to CEO Hasan Imam.

 Kudelski Flexes Cryptography Muscle in Web3, Blockchain Area | File Type: audio/mpeg | Duration: Unknown

Kudelski Security has made a big investment into the blockchain and Web3 security spaces, leveraging a team of 25 to help translate the company's expertise around cryptography and application security into the nascent market, according to CEO Andrew Howard.

 How Are Ransomware Groups' Shakedown Tactics Evolving? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how ransomware groups continue to refine their shakedown tactics and monetization models, highlights from this year's Black Hat conference and why helping those below the "InfoSec poverty line" matters to businesses.

 CrowdStrike's Michael Sentonas on Identity, Cloud and XDR | File Type: audio/mpeg | Duration: Unknown

Identity, observability, log management and cloud security have been CrowdStrike's biggest areas of investment during 2022, says CTO Michael Sentonas. The company protects against the abuse of identities through a stand-alone capability embedded on the Falcon sensor.

Comments

Login or signup comment.