Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders... more
FAQs about Data Breach Today Podcast:How many episodes does Data Breach Today Podcast have?The podcast currently has 2,918 episodes available.
December 16, 2013Fighting Fraud With ID ManagementMost fraud on the Internet is linked to unsecured identities, which is why a new global identification framework is needed, says Paul Simmonds, who heads a coalition working on a framework model....more17minPlay
December 11, 2013How a Flaw in VA Software Was FoundSecurity analyst Doug Mackey says his discovery of a vulnerability in the Department of Veterans Affairs' VistA electronic health record system highlights the importance of software security testing....more11minPlay
December 06, 2013Major Password Breach: Lessons LearnedThe theft of 2 million credentials reminds security professionals that their organizations are at risk because many employees use the same passwords and devices for personal and business purposes, data security lawyer Ronald Raether says....more9minPlay
December 02, 2013Questioning the Culture of SurveillanceYou can be outraged that the NSA collects Internet communications records of U.S. citizens. But don't be surprised, says sociologist William Staples. This is just one example of our "culture of surveillance."...more15minPlay
November 27, 2013Cloud Security: Top 10 TipsGovernments and others using cloud-based services should keep 10 security tips in mind, including making sure they can maintain control of their data if a service provider goes bankrupt, says Dimitra Liveri, co-author of a new report....more11minPlay
November 25, 2013How to Fight Cross-Border ATM FraudATM cash-outs and card-skimming schemes are getting more difficult to detect because today's attacks are global, coordinated and sophisticated, says ATM security expert Chuck Somers....more10minPlay
November 19, 2013How to Minimize Supply Chain RisksFor risk managers, an often overlooked step for minimizing supply chain risks is to continually monitor outsourcers and other third parties to address critical security issues, says the Information Security Forum's Steve Durbin....more9minPlay
November 18, 2013New Encryption Tools for the CloudComputer scientists at the Georgia Institute of Technology are developing new ways to apply encryption when storing or searching data in the cloud, says Paul Royal, associate director of the university's information security center....more10minPlay
November 18, 2013Prosecutor: ID Theft Top Fraud ConcernU.S. Attorney Steve Wiggington says identity theft, especially linked to card skimming, is still the No. 1 fraud threat facing financial services institutions as well as consumers. He stresses information sharing is critical for fighting fraud....more11minPlay
November 13, 2013Helping Clinics, Patients with SecurityWhen it comes to safeguarding the privacy and security of healthcare information, smaller clinics, as well as patients who use telehealth technologies, face considerable challenges because of a lack of expertise, says researcher David Kotz....more10minPlay
FAQs about Data Breach Today Podcast:How many episodes does Data Breach Today Podcast have?The podcast currently has 2,918 episodes available.