Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders... more
FAQs about Data Breach Today Podcast:How many episodes does Data Breach Today Podcast have?The podcast currently has 2,898 episodes available.
November 08, 2019Protecting Data in Sprawling Computing EnvironmentsSprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA....more9minPlay
November 08, 2019Analysis: Using Twitter for EspionageThe latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks....more14minPlay
November 07, 2019Why Is Third-Party Risk Management So Complex?Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner....more17minPlay
November 06, 2019Getting Ready for the NIST Privacy FrameworkBy year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights....more15minPlay
November 05, 2019Inside the Sophos 2020 Threat ReportThe Sophos 2020 Threat Report is out, and among the key findings: Ransomware attackers continue to leverage automated active attacks that can evade security controls and disable backups to do maximum damage in minimal time. John Shier of Sophos analyzes the trends that are most likely to shape the 2020 cybersecurity landscape....more21minPlay
November 01, 2019Why the Healthcare Sector Is So Vulnerable to CybercrimeThe healthcare sector is especially susceptible to ever-evolving cybercrimes, says attorney Jason G. Weiss, a former FBI special agent and forensics expert, who describes critical steps to take to avoid falling victim....more13minPlay
November 01, 2019Analysis: Preventing Data Exposure in the CloudThe latest edition of the ISMG Security Report offers an in-depth analysis of how to prevent data exposure in the cloud. Plus: why PCI's new contactless payment standard lacks PINs, and how to go beyond the hype to accurately define "zero trust."...more14minPlay
October 31, 2019Mobile Devices: Protecting Critical DataMobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponsored groups are digging ever deeper into mobile hacking, says Brian Robison of BlackBerry Cylance....more11minPlay
October 29, 2019How to Think Like an AttackerIt's one thing to know your attackers. It's another to emulate some of their techniques so you can improve your own enterprise defenses. Craig Harber, CTO of Fidelis Cybersecurity, is an advocate of this "think like an attacker" defensive strategy....more7minPlay
October 28, 2019How to Manage Supply Chain RisksAgile environments benefit from development platforms and open-source software, but that also raises the risks of attacks seeded in those supply chains, says Chet Wisniewski of Sophos, who describes steps that organizations can take to mitigate the risks....more9minPlay
FAQs about Data Breach Today Podcast:How many episodes does Data Breach Today Podcast have?The podcast currently has 2,898 episodes available.