Preview Mode Links will not work in preview mode

The Security Current Podcast features CISO-led interviews with industry thought leaders about key challenges, best practices and innovative approaches to information security, risk and privacy.

Aug 20, 2014

Black Hat Series

There are a multitude of threat data sources used by Intrusion Prevention Systems (IPS) and anti-malware products to strengthen enterprise protections. Differentiating in this competitive almost commodity service market is a matter of numbers.

securitycurrent's Vic Wheatman speaks with Jeff Harrell,...


Aug 18, 2014

YALE NEW HAVEN HEALTH SYSTEM CASE STUDY

With an increase in cyber attacks across industries, and in particular healthcare with medical-related identity theft accounting for 43 percent of all identity thefts reported in the United States last year according to the Identity Theft Resource Center, managing risk has never...


Aug 11, 2014

BLACK HAT SERIES 2014

Hackers continue to go after the easiest target -- the branch or remote office be it a gas station, retail store, bank branch, local health clinic or the like.

Armed with the knowledge that organizations are increasingly distributed and most organizations' budgets are allocated to headquarters, a...


Aug 10, 2014

BLACK HAT SERIES

Purpose-built, specialized malware dubbed "Backoff" is being found in point-of-sales (POS) systems. At the discovery, the malware, which is gathering magnetic strip information, keyed data and more, had low to zero percent anti-virus detection rates. That meant that fully updated anti-virus engines on...


Aug 9, 2014

BLACK HAT SERIES 2014

IBM's Security Systems X-Force recommends that a shift takes place from focusing on protecting the perimeter to  securing applications.

The X-Force publishes a Threat Quarterly Report that analyzes security breaches and methods used by the bad guys. Based on over one million data points, the report...