1,989 episodes

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Info Risk Today Podcas‪t‬ InfoRiskToday.com

    • Business
    • 2.8 • 4 Ratings

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

    Accellion Appliance Zero-Day Attack Breaches: Key Takeaways

    Accellion Appliance Zero-Day Attack Breaches: Key Takeaways

    This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.

    Stopping Stock Manipulation Fraud

    Stopping Stock Manipulation Fraud

    The recent manipulation of GameStop stock points to the need for public companies to carefully monitor mentions of their firm on social media channels to look for signs of emerging fraudulent practices, says Chase Cunningham, chief strategy officer at Ericom Software.

    Analysis: Feds Crack Down on Cryptocurrency Scams

    Analysis: Feds Crack Down on Cryptocurrency Scams

    The latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing.

    Mobile Health App and API Security: Common Flaws

    Mobile Health App and API Security: Common Flaws

    Broken object level authorization, or BOLA, vulnerabilities are among the most common and worrisome weaknesses contained in dozens of mobile health applications used by patients and clinicians, posing security and privacy risks to health information, says cybersecurity researcher Alissa Knight.

    Analysis: Russia's Sandworm Hacking Campaign

    Analysis: Russia's Sandworm Hacking Campaign

    This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.

    Tips on Building a Robust Data Backup Strategy

    Tips on Building a Robust Data Backup Strategy

    In light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic. He'll be a speaker at ISMG's Virtual Cybersecurity Summit: Healthcare.

Customer Reviews

2.8 out of 5
4 Ratings

4 Ratings

[O]bfuscator ,

Great content but...

The content is extremely timely and useful but the sound quality is terrible and sometimes one cannot understand what’s being said. Sound levels for the interviewer and interviewee are frequently not similar and the listener has to put up with the too loud/too quiet problem found in podcasts produced in basements and garages.

Bring up the sound quality. You’re addressing technology issues and clearly are a security professional - your product should be much better.

Top Podcasts In Business

Listeners Also Subscribed To