Government Information Security Podcast show

Government Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Authentication in Pharma: Protecting Lifesaving Secrets | File Type: audio/mpeg | Duration: Unknown

It's no secret: As pharmaceutical companies develop new health treatments, adversaries seek to steal or sabotage their intellectual property. This dynamic adds extra urgency to authentication. Tom Scontras of Yubico talks about how the pharma sector approaches authentication.

 Healthcare and Authentication: Achieving a Critical Balance | File Type: audio/mpeg | Duration: Unknown

Security and ease of use: It is one thing for nonhealthcare entities to debate these merits of new authentication in solutions. But in healthcare, where the decisions directly affect patient safety, the stakes are critical. Tom Scontras of Yubico talks about how healthcare approaches authentication.

 The Battle Against Phishing Attacks and Similar Scams | File Type: audio/mpeg | Duration: Unknown

Many entities fight an uphill battle against increasingly clever phishing and related scams that lead to serious data compromises, say former CIA analyst Eric Cole and former Department of Justice Assistant Attorney General David Kris, who are both advisers at security firm Theon Technology.

 Critical Security Considerations for Medical Devices | File Type: audio/mpeg | Duration: Unknown

Too many medical device makers don't pay close attention to the fine details and features of their product designs to ensure they are safe and secure, says Naomi Schwartz, a former product reviewer at the Food and Drug Administration and current cybersecurity adviser at security firm MedCrypt.

 Russian-Speaking Ransomware Gangs Hit New Victim: Russians | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how Russian-speaking ransomware gangs have their eyes on a new target, offers the latest on Australia's data security reckoning and the government’s response, and outlines emerging trends in customer identity and access management.

 Examining the Effects of Cyberattacks on Patient Care | File Type: audio/mpeg | Duration: Unknown

Cyberattacks on healthcare entities result in poor patient outcomes, including delayed procedures and even a rise in mortality, according to a recent survey conducted by research firm the Ponemon Institute. Ryan Witt of Proofpoint, which sponsored the study, discusses the findings.

 Online Tracking Tools Provoke Patient Privacy Concerns | File Type: audio/mpeg | Duration: Unknown

A study by data privacy firm Lokker found thousands of healthcare providers deploying Facebook Pixel and other similar tracking tools. Those trackers reveal "medical and other data that consumers don't know is being tracked and haven't authorized," says Ian Cohen, Lokker's chief executive officer.

 Top Cyber Lessons From Natural Disaster Plans in Healthcare | File Type: audio/mpeg | Duration: Unknown

Plan for a ransomware attack the same way you plan for a hurricane, says Paige Peterson Sconzo, director of healthcare services at security firm Redacted Inc. A cyber incident capable of disrupting network connectivity requires careful thinking about how to revert to the pre-internet era.

 Most Concerning Security Vulnerabilities in Medical Devices | File Type: audio/mpeg | Duration: Unknown

Security flaws in a vital signs monitoring device from a China-based manufacturer could allow hackers to launch an attack that spreads to all other devices connected to the same network. This is among the most serious security issues involving medical devices, says Jason Sinchak of Level Nine.

 Yotam Segev on What Distinguishes Cyera From Traditional DLP | File Type: audio/mpeg | Duration: Unknown

CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.

 The Growing Zelle Fraud Problem and Who Should Pay for It | File Type: audio/mpeg | Duration: Unknown

The latest ISMG Security Report examines whether banks should be held liable for the rapidly increasing Zelle fraud problem, explores the latest M&A activity among IAM vendors, and discusses the implications of the new legal framework for personal data transfers between the U.S. and Europe.

 The Challenges of Kubernetes and Cloud Containers | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," as the use of Kubernetes and cloud containers over traditional forms of storage continues to increase, Nikki Robinson of IBM discusses the benefits of breaking down "complicated environments into something that's tangible and easy to manage."

 How Adversaries Are Bypassing Weak MFA | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how adversaries have a new favorite tactic to circumvent MFA, why vendor Akamai is an appealing target for private equity, and what the industry can do differently to attract more females to leadership roles.

 The Ransomware Files, Episode 12: Unproven Data Recovery | File Type: audio/mpeg | Duration: Unknown

What if you were hired for an office job but ended up negotiating with cybercriminals? There aren’t many rules around ransomware, but this is a story about one rule that was definitely broken. By the end, the path to the truth led to a place on the other side of the world where no one wanted to be.

 How to Deal With Endemic Software Vulnerabilities | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Amit Shah, director of product marketing at Dynatrace, discusses the implications of the Log4Shell software vulnerability and the need for organizations to take an observability-led approach to software development and security going forward.

Comments

Login or signup comment.