Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders... more
FAQs about Data Breach Today Podcast:How many episodes does Data Breach Today Podcast have?The podcast currently has 2,897 episodes available.
March 12, 2021Analysis: Lessons Learned From Emotet TakedownThe latest edition of the ISMG Security Report features cybercrime deterrence lessons learned from the disruption of the Emotet botnet operation. Also featured: An update on attacks tied to Microsoft Exchange flaw exploits; a discussion of the need to update business continuity plans....more13minPlay
March 12, 2021Digital Documentation: Authenticity and IntegrityWith the explosion of remote business, we are now digitizing many of our documents and processes. Entrust’s Jay Schiavo explains what new mindset this shift requires, what’s needed to ensure document authenticity and integrity....more11minPlay
March 11, 2021SOC Management: Automation Best PracticesWhat are best practices for applying automation to make SOCs more efficient? Cory Mazzola, executive fellow at the Tuck School of Business at Dartmouth College, offers insights....more13minPlay
March 05, 2021Accellion Appliance Zero-Day Attack Breaches: Key TakeawaysThis edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity....more10minPlay
February 26, 2021Analysis: Feds Crack Down on Cryptocurrency ScamsThe latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing....more14minPlay
February 22, 2021Mobile Health App and API Security: Common FlawsBroken object level authorization, or BOLA, vulnerabilities are among the most common and worrisome weaknesses contained in dozens of mobile health applications used by patients and clinicians, posing security and privacy risks to health information, says cybersecurity researcher Alissa Knight....more15minPlay
February 19, 2021Analysis: Russia's Sandworm Hacking CampaignThis edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack....more11minPlay
February 18, 2021Tips on Building a Robust Data Backup StrategyIn light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic. He'll be a speaker at ISMG's Virtual Cybersecurity Summit: Healthcare....more11minPlay
February 17, 2021Becoming a CISO: Many Paths to SuccessMike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers....more19minPlay
February 15, 2021Why Synthetic Identity Fraud PersistsJulie Conroy of Aite Group and Shai Cohen and Lee Cookman of TransUnion analyze a new report that explains why synthetic identity fraud poses a long-term threat....more18minPlay
FAQs about Data Breach Today Podcast:How many episodes does Data Breach Today Podcast have?The podcast currently has 2,897 episodes available.