Synopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodes
-
Inside Microsoft's Zeus Malware Raid
27/03/2012"Many financial institutions have watched for years as cybercrime has escalated, and now we are shutting it down," says Greg Garcia, describing Operation B71 and how it's helping combat ACH/wire and other forms of fraud.
-
The Cost of a Data Breach
23/03/2012The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
-
Verizon: Hacktivists #1 Breach Threat
22/03/2012Verizon's 2012 Data Breach Investigations Report shows dramatic increases in attacks linked to hacktivist groups like Anonymous and LulzSec. How should organizations respond to this evolving threat?
-
Redefining IT Security's Core Tenets
16/03/2012Protecting the availability, confidentiality and integrity of information are the core tenets of IT security. But an FBI cybersecurity leader, Steve Chabinsky, suggests the central theme of IT security needs to be broadened to include assurance and attribution.
-
iPad3 4G Nudges BYOD
09/03/2012Apple's release of the new iPad will affect business. How should organizations incorporate new mobile concerns into their BYOD policies? Joe Rogalski of New York's First Niagara Bank weighs in.
-
Sizing Up the HITECH Stage 2 Rules
08/03/2012Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
-
Rallying Support for Security Investments
07/03/2012Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report.
-
Dissecting a Hacktivist Attack
06/03/2012Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
-
Breaches: The Top Trends
02/03/2012What are the top global breach trends and threats that organizations should be watching? Wade Baker of Verizon offers insights gleaned from a new study of his group's latest investigations.
-
Schmidt Hopeful on Bill's Passage
01/03/2012White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.
-
A Framework for Vulnerability Reports
29/02/2012A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities.
-
How Organized Crime Uses Banks
28/02/2012The U.S. Treasury is asking banking institutions to play a more active role in the fight against organized crime. Fraud experts at Ernst & Young share what the Treasury's new demands mean for future investments banks have to make.
-
Cyber Attacks: Not If or When, But Now
27/02/2012No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.
-
What to Expect at RSA Conference
23/02/2012This is the first RSA Conference since 2011's high-profile security breaches. How did those incidents influence this year's agenda? Hugh Thompson explains in an exclusive event preview.
-
Mobile Security: Enabling BYOD
22/02/2012Mobile security is a new discussion track at RSA Conference, but it's long been a hot topic for CISOs. Entrust's Dave Rockvam discusses BYOD and how organizations are securing personally-owned devices.
-
The Book on Insider Threats
21/02/2012The insider threat: It's a top challenge for any organization, and it's a hot topic for RSA Conference attendees. Dawn Cappelli and Randy Trzeciak preview their new book, The CERT Guide to Insider Threats.
-
Putting to Rest RSA Key Security Worries
20/02/2012IT security practitioners who employ the RSA public-private key cryptography needn't lose sleep about its efficacy, despite new research that raises questions on how it creates large prime numbers to generate secret keys, IT security authority Gene Spafford says.
-
Lax Breach Laws Endanger Businesses
20/02/2012Data breaches are under-reported, and breached organizations aren't giving consumers the information they need about these compromises, says Karen Barney of the Identity Theft Resource Center.
-
Sizing Up Impact of Class Action Suits
20/02/2012High-profile class action lawsuits filed in the wake of major health information breaches will prove to be a strong catalyst for ramped up data security, a panel of attorneys says.
-
The CISO Challenge
18/02/2012Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.