Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Careers Information Security Podcast:How many episodes does Careers Information Security Podcast have?The podcast currently has 2,846 episodes available.
July 12, 2022A New CISO PlaybookChaim Mazal, discusses the issues affecting CISOs, including how increased market share leads to increased problems and how having uniform, automated controls can provide security and enforce compliance....more28minPlay
July 11, 2022How Double-Extortion Attacks Vary By Victims' SectorRansomware attackers executing double-extortion schemes very carefully choose which data to steal and leak based on victims' economic sector, says Erick Galinkin, artificial intelligence researcher at security firm Rapid7. He discusses the latest ransomware data theft trends....more17minPlay
July 08, 2022Leveraging Interindustry Data to Discover Mule AccountsHow can you leverage artificial intelligence and make sense of data from different industries to determine whether a customer is creditworthy or whether an account is a mule account? Guy Sheppard, general manager of financial services at Aboitiz Data Innovation, discusses a case study....more20minPlay
July 07, 2022How to Respond to the New 'Fraud Universe'The latest edition of the ISMG Security Report discusses how financial service organizations should respond to the new "fraud universe." It also shares how CISOs can incorporate social media into their threat intelligence programs and describes the skills required by today's security leaders....more8minPlay
July 07, 2022Safety in the CloudAnneka Gupta, chief product officer at Rubrik, discusses embedding zero trust principles into how the security company provides data resilience, data observability and data recovery for organizations. She also describes the "software-first" approach of building immutability directly into software....more29minPlay
July 01, 2022The Mounting Threats to Sensitive Data After Roe v. WadeLocation data, browser history, IP addresses, and appointment scheduling are among the sensitive data putting individuals' privacy at risk in the wake of the decision to overturn Roe v. Wade, says Alexandra Reeve Givens of the Center for Democracy and Technology....more13minPlay
July 01, 2022OT Security: Has the Industry Made Progress?OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go....more21minPlay
June 30, 2022Zero Trust Architecture: No Firewalls or VPNsThe latest edition of the ISMG Security Report describes why firewalls and VPNs don't belong in Zero Trust design. It also discusses cybercriminals' evolving ransomware tactics and the devastating price of responding to a ransomware attack, as experienced by Travelex in 2019....more9minPlay
June 29, 2022Why FDA's Device Security Draft Guidance Is a Game-ChangerRecent draft guidance from the Food and Drug Administration represents a game-changer in how the makers of medical devices should approach the cybersecurity of their products, say Axel Wirth and Vidya Murthy of medical device security firm MedCrypt....more18minPlay
June 23, 2022Cybercrime: Conti Ransomware Retools After Backing MoscowThe latest edition of the ISMG Security Report investigates the reboot of ransomware group Conti, which supports Russia's invasion of Ukraine. It also discusses why paying ransomware actors is a "business decision" and how to respond to the talent shortage in the financial sector....more11minPlay
FAQs about Careers Information Security Podcast:How many episodes does Careers Information Security Podcast have?The podcast currently has 2,846 episodes available.