Sinopsis
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Key Considerations for Privileged Access Management
07/09/2020Recent hacking incidents, including one targeting Twitter, are raising awareness of the importance of privileged access management, says David Boda, group head of information security for Camelot Group, operator of the U.K. National Lottery. He describes PAM best practices.
-
Equifax Breach: CISO Describes Lessons Learned
04/09/2020The latest edition of the ISMG Security Report features a discusssion with Equifax CISO, Jamil Farshchi, on the lessons learned from the credit reporting firm's massive data breach three years ago. Also featured: Australians' driver's licenses leaked; privileged access management tips.
-
Building Privacy-Centered Contact-Tracing Apps
02/09/2020Contact-tracing apps are continuing to take shape around the world as the COVID-19 pandemic continues. Using privacy-by-design principles is critical to building trust in these apps, says privacy expert Ann Cavoukian.
-
Third-Party Risk Management: How to Grow a Mature Program
01/09/2020Enterprises globally recognize the challenge of third-party cyber risk, but they still struggle with the risk management. Dave Stapleton of CyberGRX discusses the elements of a mature program, including the role of risk ratings.
-
Analysis: The Unusual Case Against Former Uber CSO
28/08/2020The latest edition of the ISMG Security Report analyzes the unusual case against former Uber CSO, Joe Sullivan, who was charged in connection with allegedly covering up a data breach. Also featured: CISA director on election security; insights on preventing healthcare fraud.
-
Analysis: Why Ransomware Gangs Getting Bigger Payoffs
21/08/2020The latest edition of the ISMG Security Report analyzes why ransomware gangs continue to see bigger payoffs from their ransom-paying victims. Also featured: Lessons learned from Twitter hacking response; security flaw in Amazon's Alexa.
-
How Fraudsters Are Circumventing AI-Based Prevention Efforts
20/08/2020Criminals are devising ways to circumvent fraud-fighting measures that use artificial intelligence, says Avivah Litan, a vice president at Gartner Research, who discusses mitigation strategies.
-
Biometric Technology: Assessing the Risks
19/08/2020The growing use of biometric technology is raising concerns about privacy as well as identity theft and fraud, says attorney Paul Hales, who reviews recent legal and legislative developments.
-
Securing Remote Access With Risk-Based Authentication
19/08/2020Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.
-
Implementing DevSecOps in a Legacy Environment
18/08/2020It's a myth that organizations with legacy systems cannot implement DevSecOps, says Md.Mahbubul Alam Rafel, head of information security at Prime Bank in Bangladesh.
-
Analysis: Did Barclays Go Too Far in Monitoring Employees?
14/08/2020The latest edition of the ISMG Security Report analyzes why Barclays is being investigated for allegedly spying on its employees. Also featured: How the pandemic is affecting CISOs; an FBI assessment of nation-state threats to U.S. election.
-
Derek Manky of FortiGuard Labs on the Shift to Proactive Defense
12/08/2020Fortinet's FortiGuard Labs is out with its latest Global Threat Landscape Report, and it tracks cyber adversaries exploiting the COVID-19 pandemic at a worldwide scale. The best response? A shift to proactive defense, says FortiGuard's Derek Manky, Chief, Security Insights & Global Threat Alliances.
-
Analysis: Hijacking of Twitter Hacker's Virtual Hearing
07/08/2020The latest edition of the ISMG Security Report analyzes the hijacking of a virtual court hearing in the Twitter hacking case. Also featured: Why network segmentation is more important than ever; update on Windows print spooler vulnerability.
-
Behavioral Biometrics: Avoiding Mistakes
05/08/2020Too many companies that are implementing behavioral biometrics to combat fraud lack a complete understanding of how to make the most of the technology, says David Lacey, managing director at IDCARE, Australia and New Zealand's not-for-profit national identity and cyber support service.
-
Secret Service Agent Offers Cybercrime-Fighting Insights
03/08/2020Christopher Leone, assistant special agent in charge, United States Secret Service, offers advice to organizations on forging relationships with law enforcement as part of their cybersecurity incident preparedness plans.
-
Analysis: The Hacking of Mobile Banking App Dave
31/07/2020The latest edition of the ISMG Security Report analyzes the hacking of Dave, a mobile banking app. Plus: Sizing up the impact of GDPR after two years of enforcement and an assessment of IIoT vulnerabilities.
-
Mitigating Brand Impersonation Fraud
28/07/2020Social media analytics tools can play a key role in mitigating the risk of brand impersonation fraud, says Barika Pace, senior director analyst at Gartner.
-
Detecting Payroll Fraud With Data Analytics
27/07/2020Data analytics can play a critical role in detecting payroll fraud, says Kelly Paxton, a fraud examiner and private investigator.
-
The Celebrity Twitter Hack: What Happened?
24/07/2020The latest edition of the ISMG Security Report analyzes the hacking of high-profile Twitter accounts. Also featured: Addressing security when offices reopen; the role of personal protective equipment, or PPE, in money laundering during the pandemic.
-
COVID-19 Contact-Tracing Apps: The Privacy Issues
17/07/2020COVID-19 contract-tracing applications that help monitor individuals' possible exposure to those who have tested positive for the virus present a variety of privacy issues that must be addressed, says regulatory attorney Nancy Perkins.