1,989 episodes

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Data Breach Today Podcas‪t‬ DataBreachToday.com

    • Business
    • 4.2 • 11 Ratings

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

    Accellion Appliance Zero-Day Attack Breaches: Key Takeaways

    Accellion Appliance Zero-Day Attack Breaches: Key Takeaways

    This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.

    Analysis: Feds Crack Down on Cryptocurrency Scams

    Analysis: Feds Crack Down on Cryptocurrency Scams

    The latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing.

    Mobile Health App and API Security: Common Flaws

    Mobile Health App and API Security: Common Flaws

    Broken object level authorization, or BOLA, vulnerabilities are among the most common and worrisome weaknesses contained in dozens of mobile health applications used by patients and clinicians, posing security and privacy risks to health information, says cybersecurity researcher Alissa Knight.

    Analysis: Russia's Sandworm Hacking Campaign

    Analysis: Russia's Sandworm Hacking Campaign

    This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.

    Tips on Building a Robust Data Backup Strategy

    Tips on Building a Robust Data Backup Strategy

    In light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic. He'll be a speaker at ISMG's Virtual Cybersecurity Summit: Healthcare.

    Becoming a CISO: Many Paths to Success

    Becoming a CISO: Many Paths to Success

    Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.

Customer Reviews

4.2 out of 5
11 Ratings

11 Ratings

freechicken ,

Hey

Hey

Top Podcasts In Business

Listeners Also Subscribed To