Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
September 03, 2015FDA Official: More Medical Device Vulnerability Discoveries Are LikelyFDA official Suzanne Schwartz, M.D., expects more medical device security vulnerabilities to come to light in the year ahead. The FDA soon will issue new guidance addressing the cybersecurity of medical devices already in use....more0minPlay
September 02, 2015After Hacks, ONC Emphasizing ID and Access ManagementIn the wake of hacker attacks, which have left healthcare providers uncertain about what security steps to take, the Office of the National Coordinator for Health IT is working to help organizations sort out role-based identity and access management issues, says ONC's privacy officer, Lucia Savage....more0minPlay
September 02, 2015How Hackers Are Bypassing Intrusion DetectionMore hackers are exploiting remote-access and network vulnerabilities, rather than installing malware to invade networks and exfiltrate data, says Dell SecureWorks' researcher Phil Burdette. That's why conventional breach-detection tools aren't catching the intrusions....more0minPlay
September 02, 2015Incident Response: Lessons Government Can Learn from IndustryGovernment agencies used to be the top attack target, as well as the top source of threat intelligence. How did the private sector turn the tables, and what can government do to improve? Rapid7's Wade Woolwine offers insight....more0minPlay
September 02, 2015InfoSec Careers: How to Attract, Retain More WomenCybersecurity adviser Patricia Titus, a former CISO, says too many women are leaving the information security field for jobs with less pressure and more work schedule flexibility. So she urges organizations to offer more incentives to attract and retain women in the field....more0minPlay
September 01, 2015Proactive Malware HuntingIf malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes....more0minPlay
September 01, 2015Fighting Healthcare Payments FraudWhen it comes to healthcare payments, fraud tends to come in two flavors: Organized and opportunistic. What are the biggest gaps in detecting and preventing these schemes? IBM's Robert McGinley shares insight....more0minPlay
September 01, 2015How KeyRaider Malware Hacked 225K Apple AccountsThe bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk....more0minPlay
August 31, 2015Hacker Havens: The Rise of Bulletproof Hosting EnvironmentsUnderground cybercrime forums continue to evolve, offering services ranging from cybercrime toolkits and money laundering to bulletproof hosting and a service that reviews exfiltrated data for corporate secrets, says cybersecurity analyst Tom Kellermann of Trend Micro....more0minPlay
August 27, 2015Gartner's Litan Warns of EMV Fraud RisksAlthough EMV is a far more secure payments technology, it can be exploited for fraud if it's improperly implemented, warns Gartner analyst Avivah Litan. What security lessons must be learned from past EMV deployments?...more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.