1,989 episodes

Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders

Credit Union Information Security Podcast CUInfoSecurity.com

    • Business
    • 4.0 • 1 Rating

Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders

    Applying Critical, Systems and Design Thinking to Security

    Applying Critical, Systems and Design Thinking to Security

    Brian Barnier, a director of analytics who is developing a course on critical and design thinking in cybersecurity for CyberEd.io, is a firm believer in the importance of critical thinking today. He discusses how that, plus systems and design thinking, can improve the way cybersecurity functions.

    Ransomware Updates: Conti Attacks Rise, New Players Surface

    Ransomware Updates: Conti Attacks Rise, New Players Surface

    The latest edition of the ISMG Security Report features an analysis of how the U.S. government has been tracking an increase in the pace of attacks tied to Conti ransomware. Also featured are what "protection" means today and building a new cybersecurity operating model.

    Is White House Crackdown on Ransomware Having Any Effect?

    Is White House Crackdown on Ransomware Having Any Effect?

    The latest edition of the ISMG Security Report features an analysis of the state of the Biden administration's efforts to disrupt ransomware attackers, as well as how a newly patched Apple iMessage flaw was being targeted by Pegasus spyware to effect zero-click exploits.

    Ransomware: Hot or Not? Here's Attackers' Ideal Target

    Ransomware: Hot or Not? Here's Attackers' Ideal Target

    The latest edition of the ISMG Security Report features an analysis of the most sought-after type of victim for ransomware-wielding attackers. Also featured: fighting extortion schemes and stress management tips.

    Navigating the New Internet Attack Surface

    Navigating the New Internet Attack Surface

    It’s the largest attack surface in history, and adversaries are taking advantage by launching attacks at an unprecedented volume and velocity. Shashi Prakash of Bolster discusses how to monitor and manage this new and shifting range.

    Analysis: The Latest Data Breach Trends

    Analysis: The Latest Data Breach Trends

    The latest edition of the ISMG Security Report features an analysis of data breach trends. Also featured: yet another Microsoft Exchange vulnerability and misconceptions about cybercrime groups.

Customer Reviews

4.0 out of 5
1 Rating

1 Rating

Top Podcasts In Business

Listeners Also Subscribed To