Credit Union Information Security Podcast
- Autor: Vários
- Narrador: Vários
- Editora: Podcast
- Mais informações
Informações:
Sinopse
Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episódios
-
How to Deal With Endemic Software Vulnerabilities
05/10/2022In this episode of "Cybersecurity Unplugged," Amit Shah, director of product marketing at Dynatrace, discusses the implications of the Log4Shell software vulnerability and the need for organizations to take an observability-led approach to software development and security going forward.
-
Passwords Are Unfit - So Why Do We Still Have Them?
03/10/2022Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.
-
Cyberwar: Assessing the Geopolitical Playing Field
29/09/2022The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of Traceable.ai discuss what the U.S. government and companies need to do to win this cyberwar.
-
Examining What Went Wrong for Optus
29/09/2022The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.
-
It's 2022. Do You Know Where Your Old Hard Drives Are?
22/09/2022The latest edition of the ISMG Security Report discusses financial giant Morgan Stanley's failure to invest in proper hard drive destruction oversight, the future of ransomware and the gangs that have attacked organizations in recent years, and the methods required to secure new payments systems.
-
The Ransomware Files, Episode 11: The Adult Boutique
16/09/2022Dain Drake was CEO of a steel fabrication factory. In June 2019, Drake found himself standing outside a closed adult boutique in Houston at 10:00 a.m. on a Sunday. He called the owner and pleaded for him to come. He needed something inside, which might just save his business - from ransomware.
-
Analyzing Twitter's Security Nightmare
15/09/2022The latest edition of the ISMG Security Report discusses the appearance at a Senate hearing this week by the former head of security for Twitter; the top-performing web application and API protection vendors, according to Gartner's Magic Quadrant 2022; and threat trends to watch for in 2023.
-
Behind Agency Doors: Where Is Security Progress Being Made?
12/09/2022In this episode of "Cybersecurity Unplugged," U.S. Air Force Chief Software Officer Nicolas M. Chaillan, a former DHS and DOD adviser, shares his opinions about the government's handling of DevSecOps and cybersecurity, where progress is being made and where more work needs to be done.
-
Vulnerabilities Identified in Baxter Infusion Pump Devices
09/09/2022Vulnerabilities in certain medication infusion pump products from manufacturer Baxter could compromise a hospital's biomedical network. The flaws highlight the risks involving the acquisition and disposal of medical technology, says researcher Deral Heiland of Rapid7.
-
Protecting Industrial Security When Uptime Is Essential
09/09/2022In this episode of "Cybersecurity Unplugged," Mark Cristiano of Rockwell Automation discusses Rockwell's cybersecurity journey, the particular challenges of deploying cybersecurity in an OT environment, and the minimum and proper industrial protections that organizations need to have in place.
-
EvilProxy Bypasses MFA by Capturing Session Cookies
09/09/2022The latest ISMG Security Report discusses a new phishing-as-a-service toolkit designed to bypass multifactor authentication, the decision by Lloyd's of London to exclude nation-state attacks from cyber insurance policies, and challenges at Okta after it acquired customer identity giant Auth0.
-
Cybersecurity & Threat Modeling: Automated vs. Manual
07/09/2022Cybersecurity threat modeling: automated tools or manual methods? It's not an either-or situation, say Stephen de Vries, CEO and co-founder of IriusRisk, and Adam Shostack, president of Shostack and Associates. Each approach brings unique business value, and they discuss the merits of both methods.
-
Overcoming Zero Trust Obstacles in Healthcare
02/09/2022The sheer number of connected devices in healthcare environments is one of the top challenges healthcare entities face in adopting a zero trust approach to cybersecurity, says Zachary Martin, senior adviser at law firm Venable. He discusses the obstacles to achieving zero trust in healthcare.
-
Banning Ransoms: The Evolving State of Ransomware Response
01/09/2022The latest edition of the ISMG Security Report explores the possible unintended consequences of banning ransom payments, the challenges of opening a cyber intel firm during wartime, and the need for more clarity in the regulation of cryptocurrency firms.
-
Reducing Risks by Optimizing Your Cybersecurity Workflow
31/08/2022CISOs have enough tools to identify security weaknesses, says Yoran Sirkis, but they need a way to make the information those tools gather more accessible and to streamline the remediation process. The CEO of Seemplicity discusses how its platform can help security leaders manage remediations.
-
Addressing Security Risks of Mounting Legacy Health Data
26/08/2022In many healthcare entities, the amount of data that is being generated and retained continues to grow - and that mounting trove of legacy data is often never disposed, expanding the surface for cyberattacks and other compromises, says Matthew Bernstein of consulting firm Bernstein Data.
-
Are Ransomware-as-a-Service Groups in Decline?
25/08/2022The latest edition of the ISMG Security Report discusses how ransomware-as-a-service groups are shifting their business models, how investigators battling cybercrime have been hindered by GDPR, and how employees consider workplace "choice" a key factor for job satisfaction.
-
Paul Martini of iboss on the Mainstream Market Embracing SSE
22/08/2022Implementation of security service edge technology has progressed over the past six months from early adopters to mainstream organizations, with requests for proposals around SSE projects now carrying tight deadlines rather than no deadline at all, says iboss co-founder and CEO Paul Martini.
-
The Complexity of Managing Medical Device Security Risk
19/08/2022The extremely diverse architectures and systems within the tens of thousands of very specialized types of medical devices used in clinical settings adds to the complexity healthcare organizations and manufacturers face in managing cybersecurity risk for these products, says Phil Englert of H-ISAC.
-
Obsidian's Hasan Imam on Spotting SaaS App Vulnerabilities
19/08/2022Obsidian Security has in recent months invested in giving enterprises more visibility into how their SaaS applications are talking to other SaaS applications so that supply chain compromise can be more easily detected and thwarted, according to CEO Hasan Imam.

Experimente 7 dias grátis
- Acesso ilimitado a todo o conteúdo da plataforma.
- Mais de 30 mil títulos, entre audiobooks, ebooks, podcasts, séries, documentários e notícias.
- Narração dos audiolivros feita por profissionais, entre atores, locutores e até mesmo os próprios autores.