1,989 episodes

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders

Government Information Security Podcas‪t‬ GovInfoSecurity.com

    • Government

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders

    Accellion Appliance Zero-Day Attack Breaches: Key Takeaways

    Accellion Appliance Zero-Day Attack Breaches: Key Takeaways

    This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.

    Analysis: Feds Crack Down on Cryptocurrency Scams

    Analysis: Feds Crack Down on Cryptocurrency Scams

    The latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing.

    Secure Patient Access to Health Records: The Challenges

    Secure Patient Access to Health Records: The Challenges

    As the healthcare sector works to provide patients with secure access to their health information via smartphones and other devices, it must address critical identity and trust issues, says DirectTrust president and CEO Scott Stuewe.

    Analysis: Russia's Sandworm Hacking Campaign

    Analysis: Russia's Sandworm Hacking Campaign

    This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.

    Becoming a CISO: Many Paths to Success

    Becoming a CISO: Many Paths to Success

    Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.

    Why Synthetic Identity Fraud Persists

    Why Synthetic Identity Fraud Persists

    Julie Conroy of Aite Group and Shai Cohen and Lee Cookman of TransUnion analyze a new report that explains why synthetic identity fraud poses a long-term threat.

Top Podcasts In Government

Listeners Also Subscribed To