Government Information Security Podcast show

Government Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Russia-Ukraine War: Over 300 Cyber Operations Seen So Far | File Type: audio/mpeg | Duration: Unknown

The ongoing Russia-Ukraine war has featured cyber operations being used to target Ukraine as well as Russia. But CyberPeace Institute, which tracks cyberattacks tied to the conflict, has so far seen 27 different countries being affected by more than 300 attacks, and many have affected civilians.

 Hunting the Bad Guys Behind Golden SAML Attacks | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Yonatan Khanashvili describes in detail how Golden Security Assertion Markup Language attacks occur and how SOC platforms with much greater capacity to cross-correlate data than legacy SIEMs can help defenders detect and hunt for them.

 Okta's Marc Rogers on Why Beating Ransomware Is a Team Sport | File Type: audio/mpeg | Duration: Unknown

Increased collaboration between the public and private sectors hasn't slowed the increased frequency and ease of ransomware intrusions, but efforts to change the financial incentives of ransomware are having "a pretty good effect," says Marc Rogers, vice president of cybersecurity strategy at Okta.

 Arctic Wolf's Dan Schiappa on Cloud Security in a Recession | File Type: audio/mpeg | Duration: Unknown

The impending recession should accelerate cloud adoption as firms look to reduce infrastructure costs, but these moves will introduce a new set of security challenges. Arctic Wolf Chief Product Officer Dan Schiappa predicts many companies will start building security into their applications sooner.

 Reducing Risk by Breaking Down Supply Chain Siloes | File Type: audio/mpeg | Duration: Unknown

Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says.

 Ransomware: What We Know and What We Don't Know | File Type: audio/mpeg | Duration: Unknown

This edition of the ISMG Security Report analyzes the latest ransomware trends from the European Union Agency for Cybersecurity, findings from the first-ever Cyber Safety Review Board on the Log4j incident, and how security and privacy leaders are harmonizing new U.S. privacy laws.

 The Cryptocurrency Bloodbath and the Future of Crypto | File Type: audio/mpeg | Duration: Unknown

Commodity markets have created a cryptocurrency bloodbath that may not be over, but Richard Bird of SecZetta says economic patterns in history show that crypto "is not invalidated as a mean of commerce and exchange." He discusses the blockchain and the possible future uses of crypto.

 The Growing Cost of Data Breaches, Especially in Healthcare | File Type: audio/mpeg | Duration: Unknown

Data breaches in the healthcare sector cost about $10.1 million - more than double the average cost of breaches across other industries - once again ranking the sector as having the most expensive data breaches, says Limor Kessem, principal consultant of cyber crisis management at IBM Security.

 Analysis: How Uber Covered Up a Breach and Avoided Charges | File Type: audio/mpeg | Duration: Unknown

The ISMG Security Report analyzes a settlement with the U.S. Justice Department, in which Uber accepts responsibility for a data breach cover-up to avoid criminal charges. It also discusses why early-stage startups are conserving cash and recent initiatives from the U.S. Federal Trade Commission.

 Whatever Happened to Russia's Cyber War Against Ukraine? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report asks: Whatever happened to Russia's cyberwar against Ukraine? It also looks at the curious case of a cardiologist who's been accused of moonlighting as a developer of such notorious strains of ransomware as Thanos and Jigsaw.

 Separating the Quantum Computing Hype From the Reality | File Type: audio/mpeg | Duration: Unknown

Future quantum computers will decrypt encrypted data, so businesses feel pressure to find quantum-resistant security solutions for data transmission. Wells Fargo Bank's Peter Bordow discusses the state of quantum computing, approaches to quantum security, and privacy-enhancing technologies.

 Assessing the Privacy, Security Risks of Digital Health IT | File Type: audio/mpeg | Duration: Unknown

A new assessment framework aims to help patients, healthcare providers and others examine the various privacy, security and other risks of digital health technologies, says Tim Andrews of the nonprofit Organization for the Review of Care and Health Applications, which co-developed the framework.

 Crime Watch: Why Are Ransomware Attacks Intensifying? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report analyzes why the number of ransomware attacks and the amounts being paid in ransoms are both on the rise. It also discusses today's cyberthreat landscape and whether organizations should rely on user training to improve security.

 The Nature of Application Code | File Type: audio/mpeg | Duration: Unknown

Rui Ribeiro, the founder and CEO of Jscrambler, a company that monitors and obfuscates JavaScript code, discusses the proliferation of web applications that use third-party code, the liability risks that often exist, and how Jscramber's products can increase the security of all application code.

 Big Health Data: Top Privacy, Security Considerations | File Type: audio/mpeg | Duration: Unknown

Many healthcare sector entities are undertaking projects involving the collection, analysis and sharing of large volumes of health data. But along with those efforts come critical privacy and security concerns, says attorney Iliana Peters of Polsinelli.

Comments

Login or signup comment.