Breach 公開
[search 0]
もっと

Download the App!

show episodes
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
 
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students. Support this podcast: https://anchor.fm/badbreaches/support
 
This is “Life, Death and Data Breach”, a podcast about the pains and pitfalls of dealing with sensitive data in large and unorganized company repositories. Jeanne Somma, insights executive and counsel with ayfie and seasoned eDiscovery practitioner and Johannes Stiehler, CEO of ayfie and a linguist at heart discuss how to recognize and solve some of the challenges of discovering and protecting textual information. If you are a legal practitioner, data security officer or just interested in d ...
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
 
Loading …
show series
 
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.DataBreachToday.com による
 
In this weeks episode Erica chats with Shelby Nielson, PhD student studying epidemiology about a study evaluating the impact of vessel traffic on foraging behavior of the SRKW's. They discuss this study, new regulations in Washington and the recent siting of what was thought to be a long lost Norther Resident Killer Whale. See link's below for more…
 
In this episode Erica chats with Liam Doucet, activist and high school student from Portland, Oregon about the history of the Lower Snake River Dams as well as their current function. They expand the conversation, exploring the spiritual connection between orca and humans.
 
New regulatory provisions that allow healthcare systems to make donations of cybersecurity technology and services to physician practices could help greatly bolster security in the sector, says attorney Julie Kass of law firm Baker Donelson.DataBreachToday.com による
 
As federal regulators intensify their focus on compliance with requirements to provide patients with access to their health information, healthcare organizations need to sort through a variety of emerging challenges, says health information management and privacy expert Rita Bowen.DataBreachToday.com による
 
The latest edition of the ISMG Security Report offers leadership lessons from Equifax CISO Jamil Farshchi and Mastercard's deputy CSO, Alissa "Dr. Jay" Abdullah. Also featured: An assessment of cybersecurity priorities for President-elect Joe Biden.DataBreachToday.com による
 
The growth in the use of telehealth during the COVID-19 crisis means that healthcare providers must carefully reassess and bolster the security of the connected devices, applications and systems used, says Kelly Rozumalski of the consultancy Booz Allen Hamilton.DataBreachToday.com による
 
In the year ahead, healthcare organizations must be prepared to face an assortment of advancing security threats, including those that damage the integrity of critical patient data, says Rod Piechowski of the Healthcare Information and Management Systems Society.DataBreachToday.com による
 
The COVID-19 pandemic has spotlighted an array of evolving patient privacy issues that legislators and regulators will need to address in the year ahead, say government policy experts Mari Savickis and Cassie Leonard of the College of Healthcare Information Management Executives.DataBreachToday.com による
 
This edition of the ISMG Security Report features insights from David Forscey, managing director at Aspen Cybersecurity Group, on improving supply chain security in the aftermath of the SolarWinds hack. Also featured: Black Hat Europe's key takeaways; keeping safe during the holidays.DataBreachToday.com による
 
The Mandalorian Season 2 ended with a bang and our resident Star Wars experts are here to put the whole series in perspective. Join us for some hot takes and be sure to subscribe.Sergio Lugo, Reid Walker, Josh Alcaraz, Robert Morris & Others による
 
In light of the SolarWinds supply chain breach and other security incidents, the United States has substantial work to do in building a resilient digital infrastructure, says David Forscey of the Aspen Cyber Group, who outlines a five-step road map.DataBreachToday.com による
 
What critical factors should organizations consider before taking the step of paying extortionists a ransom in hopes of regaining access to systems or avoiding the release of data in the wake of a ransomware attack? Former FBI special agent Vincent D'Agostino provides guidance.DataBreachToday.com による
 
This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.DataBreachToday.com による
 
In part three of The Risk of Reason, Lady Justice and her newly minted Judge confront the traitorous resurrectionist Douglas McMourning. But Lady Justice must also confront a figure from her past.Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by…
 
This edition of the ISMG Security Report features a discussion with Christopher Krebs, the recently fired director of the Cybersecurity Infrastructure Security Agency, on his accomplishments at the agency. Also featured are updates on ransomware gangs recruiting affiliates and healthcare supply chain risks.…
 
With the escalation of cyberattacks on the healthcare sector during the COVID-19 pandemic, supply chain partners need to strengthen their security controls and defenses, say Vishwas Gadgil of pharmaceutical firm Merck and Ed Gaudet of the consultancy Censinet. They describe updated guidance on the subject.…
 
"Better, cheaper, faster." These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says.DataBreachToday.com による
 
The latest edition of the ISMG Security Report features an analysis of how President-elect Joe Biden is expected to renew international relationships needed in the fight against cyberattacks. Also featured: the pandemic's impact on cybercrime; analysis of Europol's annual cybercrime report.DataBreachToday.com による
 
It’s a well known secret that there is chaos in the data backyards of almost all companies. While we struggle to create and implement policies, guidelines and possibly regulatory compliance, everybody just keeps on creating documents, putting them wherever seems suitable, creating copies and versions. Do you care? Should you care? What can we do to…
 
The latest edition of the ISMG Security Report features an analysis of the EU General Data Protection Regulation fines that have finally been imposed on Marriott and BA over serious data breaches each suffered. Also featured: Regional digital fraud trends, and a look at the CISO role and its responsibilities.…
 
The latest edition of the ISMG Security Report features a discussion with FBI Agent Elvis Chan on the cyber disruptions to expect immediately after the Nov. 3 U.S. election. Also featured: smart lock security flaws; cryptocurrency-funded crimes in 2021.DataBreachToday.com による
 
In this very special episode we deviate a little bit from our focus on data privacy and talk about data piracy instead. More specifically, we shed some light on how Jeanne Somma became a lawyer by trade and technologist by accident. We not only cover what could be considered career advice, but also touch upon the topics of usability, the Apple Newt…
 
The latest edition of the ISMG Security Report analyzes the U.S. indictment against Russian hackers who were allegedly behind NotPetya. Also featured: A discussion of nation-state adversaries and how they operate; an update on Instagram privacy investigation.DataBreachToday.com による
 
The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.DataBreachToday.com による
 
Many healthcare organizations are failing to address shortcomings in security risk management for their supply chains, says former healthcare CIO David Finn, describing findings of a recent study assessing the state of cybersecurity in the sector.DataBreachToday.com による
 
The latest edition of the ISMG Security Report analyzes a new report that labels ransomware as the No. 1 cybercrime threat. Also featured: A former FBI agent offers an update on "disruptionware" attacks; how Tesla's autopilot is tricked by phantom images.DataBreachToday.com による
 
What is a data subject access request and how can you use it to take revenge on your employer? In this episode we discuss uses and abuses of this mechanism and how it affects different industries. The “triangle of problems” – people, processes and technology – again plays a key role in finding a solution for DSARs that doesn’t break the bank.…
 
The latest edition of the ISMG Security Report analyzes why clothing retailer H&M was hit with a hefty fine for violating the EU's General Data Protection Rule. Also featured: The coming of age of digital identities; deputy CSO at Mastercard on top priorities for 2021.DataBreachToday.com による
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login