title

Careers Information Security Podcast

CareersInfoSecurity.com

2
Followers
1
Plays
Careers Information Security Podcast
Careers Information Security Podcast

Careers Information Security Podcast

CareersInfoSecurity.com

2
Followers
1
Plays
OVERVIEWEPISODESYOU MAY ALSO LIKE

Details

About Us

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Latest Episodes

Analysis: Fallout From the Snowden Memoir

The latest edition of the ISMG Security Report features a discussion of the controversies surrounding the release of whistleblower Edward Snowden's memoir. Also featured: An update on Lumen PDF's breach disclosure; insights on financial services identity management issues.

-1 s1 days ago
Comments
Analysis: Fallout From the Snowden Memoir

Using Artificial Intelligence to Combat Card Fraud

Artificial intelligence is playing an important role in the fight against payment card fraud, says Gord Jamieson, senior director of Canada risk services at Visa. He'll offer a keynote presentation on the latest fraud trends at Information Security Media Group's Cybersecurity Summit in Toronto Sept 24-25.

-1 s4 days ago
Comments
Using Artificial Intelligence to Combat Card Fraud

Mainframe Security Challenges: An Encroaching Perimeter

Even with the uptake of cloud services, many large enterprises still hold data on mainframes, says Philip MacLochlainn of IBM. But the diversity of computing environments around mainframes is rapidly changing, which increases the risk of data breaches, he explains.

-1 s4 days ago
Comments
Mainframe Security Challenges: An Encroaching Perimeter

Why Healthcare Needs to Shift Its Cybersecurity Focus

Despite progress in improving cybersecurity, the healthcare sector still needs to change its focus from compliance to risk, says Mac McMillan, co-founder and CEO emeritus of security consulting firm CynergisTek.

-1 s4 days ago
Comments
Why Healthcare Needs to Shift Its Cybersecurity Focus

Ransomware Gangs Practice Customer Relationship Management

Ransomware-wielding attackers treat infecting endpoints as a business and put customer relationship management principles to work, says Bill Siegel, CEO of ransomware incident response firm Coveware. He notes criminals "go after the low-hanging fruit because it's cheap and the conversion rate is high."

-1 s1 weeks ago
Comments
Ransomware Gangs Practice Customer Relationship Management

For Sale: Admin Access Credentials to Healthcare Systems

Cybercriminals are "upping their game" by stealing and then auctioning off on the dark web administrative access credentials to healthcare organizations' clinician and patient portals, says Etay Maor of IntSights.

-1 s1 weeks ago
Comments
For Sale: Admin Access Credentials to Healthcare Systems

Analysis: The Impact of Business Email Compromise Attacks

This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens of suspects. Also featured: updates on the easy availability of low-cost hacking tools and the latest payment card fraud trends.

-1 s1 weeks ago
Comments
Analysis: The Impact of Business Email Compromise Attacks

Tips on Countering Insider Threat Risks

Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them? Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses.

-1 s1 weeks ago
Comments
Tips on Countering Insider Threat Risks

Remote Desktop Protocol: The Security Risks

In the past year, cybercriminals behind two of the biggest ransomware attacks have abandoned other techniques in favor of exploiting remote desktop protocol. Matt Boddy of Sophos explains why RDP attacks are so popular - and what you can do to discourage them.

-1 s1 weeks ago
Comments
Remote Desktop Protocol: The Security Risks

Analysis: Report on China Attacking Mobile Devices

This week's ISMG Security Report takes a close look at whether an iPhone hacking campaign may be linked to Android spying campaigns by China. Plus: Do ransomware gangs target organizations that have cyber insurance?

-1 s2 weeks ago
Comments
Analysis: Report on China Attacking Mobile Devices

Latest Episodes

Analysis: Fallout From the Snowden Memoir

The latest edition of the ISMG Security Report features a discussion of the controversies surrounding the release of whistleblower Edward Snowden's memoir. Also featured: An update on Lumen PDF's breach disclosure; insights on financial services identity management issues.

-1 s1 days ago
Comments
Analysis: Fallout From the Snowden Memoir

Using Artificial Intelligence to Combat Card Fraud

Artificial intelligence is playing an important role in the fight against payment card fraud, says Gord Jamieson, senior director of Canada risk services at Visa. He'll offer a keynote presentation on the latest fraud trends at Information Security Media Group's Cybersecurity Summit in Toronto Sept 24-25.

-1 s4 days ago
Comments
Using Artificial Intelligence to Combat Card Fraud

Mainframe Security Challenges: An Encroaching Perimeter

Even with the uptake of cloud services, many large enterprises still hold data on mainframes, says Philip MacLochlainn of IBM. But the diversity of computing environments around mainframes is rapidly changing, which increases the risk of data breaches, he explains.

-1 s4 days ago
Comments
Mainframe Security Challenges: An Encroaching Perimeter

Why Healthcare Needs to Shift Its Cybersecurity Focus

Despite progress in improving cybersecurity, the healthcare sector still needs to change its focus from compliance to risk, says Mac McMillan, co-founder and CEO emeritus of security consulting firm CynergisTek.

-1 s4 days ago
Comments
Why Healthcare Needs to Shift Its Cybersecurity Focus

Ransomware Gangs Practice Customer Relationship Management

Ransomware-wielding attackers treat infecting endpoints as a business and put customer relationship management principles to work, says Bill Siegel, CEO of ransomware incident response firm Coveware. He notes criminals "go after the low-hanging fruit because it's cheap and the conversion rate is high."

-1 s1 weeks ago
Comments
Ransomware Gangs Practice Customer Relationship Management

For Sale: Admin Access Credentials to Healthcare Systems

Cybercriminals are "upping their game" by stealing and then auctioning off on the dark web administrative access credentials to healthcare organizations' clinician and patient portals, says Etay Maor of IntSights.

-1 s1 weeks ago
Comments
For Sale: Admin Access Credentials to Healthcare Systems

Analysis: The Impact of Business Email Compromise Attacks

This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens of suspects. Also featured: updates on the easy availability of low-cost hacking tools and the latest payment card fraud trends.

-1 s1 weeks ago
Comments
Analysis: The Impact of Business Email Compromise Attacks

Tips on Countering Insider Threat Risks

Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them? Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses.

-1 s1 weeks ago
Comments
Tips on Countering Insider Threat Risks

Remote Desktop Protocol: The Security Risks

In the past year, cybercriminals behind two of the biggest ransomware attacks have abandoned other techniques in favor of exploiting remote desktop protocol. Matt Boddy of Sophos explains why RDP attacks are so popular - and what you can do to discourage them.

-1 s1 weeks ago
Comments
Remote Desktop Protocol: The Security Risks

Analysis: Report on China Attacking Mobile Devices

This week's ISMG Security Report takes a close look at whether an iPhone hacking campaign may be linked to Android spying campaigns by China. Plus: Do ransomware gangs target organizations that have cyber insurance?

-1 s2 weeks ago
Comments
Analysis: Report on China Attacking Mobile Devices