Government Information Security Podcast show

Government Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Are Ransomware-as-a-Service Groups in Decline? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how ransomware-as-a-service groups are shifting their business models, how investigators battling cybercrime have been hindered by GDPR, and how employees consider workplace "choice" a key factor for job satisfaction.

 Paul Martini of iboss on the Mainstream Market Embracing SSE | File Type: audio/mpeg | Duration: Unknown

Implementation of security service edge technology has progressed over the past six months from early adopters to mainstream organizations, with requests for proposals around SSE projects now carrying tight deadlines rather than no deadline at all, says iboss co-founder and CEO Paul Martini.

 The Complexity of Managing Medical Device Security Risk | File Type: audio/mpeg | Duration: Unknown

The extremely diverse architectures and systems within the tens of thousands of very specialized types of medical devices used in clinical settings adds to the complexity healthcare organizations and manufacturers face in managing cybersecurity risk for these products, says Phil Englert of H-ISAC.

 Obsidian's Hasan Imam on Spotting SaaS App Vulnerabilities | File Type: audio/mpeg | Duration: Unknown

Obsidian Security has in recent months invested in giving enterprises more visibility into how their SaaS applications are talking to other SaaS applications so that supply chain compromise can be more easily detected and thwarted, according to CEO Hasan Imam.

 Kudelski Flexes Cryptography Muscle in Web3, Blockchain Area | File Type: audio/mpeg | Duration: Unknown

Kudelski Security has made a big investment into the blockchain and Web3 security spaces, leveraging a team of 25 to help translate the company's expertise around cryptography and application security into the nascent market, according to CEO Andrew Howard.

 How Are Ransomware Groups' Shakedown Tactics Evolving? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how ransomware groups continue to refine their shakedown tactics and monetization models, highlights from this year's Black Hat conference and why helping those below the "InfoSec poverty line" matters to businesses.

 CrowdStrike's Michael Sentonas on Identity, Cloud and XDR | File Type: audio/mpeg | Duration: Unknown

Identity, observability, log management and cloud security have been CrowdStrike's biggest areas of investment during 2022, says CTO Michael Sentonas. The company protects against the abuse of identities through a stand-alone capability embedded on the Falcon sensor.

 Infoblox's Jesper Andersen on How to Identify Threats Sooner | File Type: audio/mpeg | Duration: Unknown

Infoblox has invested in shifting left in the cybersecurity kill chain with on-premises, cloud and hybrid versions of its BloxOne Threat Defense tools, which help security practitioners find and identify threats earlier and mitigate risks, says President and CEO Jesper Andersen.

 COVID-19's Impact on Cybersecurity Marketing | File Type: audio/mpeg | Duration: Unknown

Marketers rely on events to create brand awareness and generate demand, and physical events are coming back after the COVID-19 pandemic, says Gily Netzer of Perimeter 81. But "not everybody is traveling," she says, so hybrid events - and SaaS-driven corporate networks - are the future for companies.

 Sumedh Thakar on Fusing Vulnerability and Patch Management | File Type: audio/mpeg | Duration: Unknown

Companies continue to struggle with prioritizing which vulnerabilities present the greatest risk to the business and need to be remediated first since vulnerability scoring is too often based on a static set of what could happen if an issue is exploited, says Qualys President and CEO Sumedh Thakar.

 Why XDR Beats SIEM at Spotting Threats in Noisy Environments | File Type: audio/mpeg | Duration: Unknown

SIEM can play a key role in aggregating log data for compliance or auditing purposes, but when it comes to identifying threat activity in an IT environment, nothing beats XDR, which excels at using advanced techniques to pinpoint threats in high volumes of data, says Secureworks' Ryan Alban.

 Why Being Prepared Is the Key to Preventing Cyberattacks | File Type: audio/mpeg | Duration: Unknown

Hybrid war includes cyberattacks, critical infrastructure attacks and efforts to get information. Victoria Beckman, director of Microsoft's Digital Crimes Unit in the Americas, says Ukraine used a national cybersecurity strategy to withstand such attacks from Russia and so can other countries.

 Cyber Operations Keep Affecting Civilians as War Continues | File Type: audio/mpeg | Duration: Unknown

The ISMG Security Report discusses how cyberattacks and operations tied to the Russia-Ukraine war have been affecting civilians since the start of Russia's invasion, whether a practicing cardiologist living in Venezuela is also a ransomware mastermind and effective bot management tooling strategies.

 Secrets in the Code: Open-Source API Security Risks | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Apiiro's Moshe Zioni, vice president of security research, discusses the company's "Secrets Insights 2022" report on the real-world risks of hardcoded secrets across the software supply chain and how to mitigate the potential damage they can cause.

 Medical Device SBOMs: Attention to Details Matter | File Type: audio/mpeg | Duration: Unknown

It's not enough for medical device makers to provide a software bill of materials - there also needs to be close attention paid to how vulnerabilities in components are communicated and managed, says medical device security expert Ken Hoyme.

Comments

Login or signup comment.