Cover image of Careers Information Security Podcast

Careers Information Security Podcast

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Ranked #1

Podcast cover

Remote Workforce Security: The Role of 'Zero Trust'

Remote Workforce Security: The Role of 'Zero Trust'

Kevin Schwarz of Zscaler discusses the security implications of the "new normal" of employees working from home, includi... Read more

21 May 2020

Ranked #2

Podcast cover

Analysis: Securing RDP to Prevent Ransomware Attacks

Analysis: Securing RDP to Prevent Ransomware Attacks

The latest edition of the ISMG Security Report discusses securing RDP to prevent ransomware attacks. Also featured: A lo... Read more

15 May 2020

Similar Podcasts

Ranked #3

Podcast cover

Case Study: Enhancing Endpoint Security

Case Study: Enhancing Endpoint Security

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of e... Read more

28 Apr 2020

Ranked #4

Podcast cover

The Future of Passwordless Authentication

The Future of Passwordless Authentication

"Passwordless authentication" is one of the hot cybersecurity topics, but who's actually implemented it - and how? Jeff ... Read more

7 Apr 2020

Most Popular Podcasts

Ranked #5

Podcast cover

Privacy Advocate Tackles Issue of Patient Consent Rights

Privacy Advocate Tackles Issue of Patient Consent Rights

As health data privacy concerns heat up to a boiling point on multiple fronts, it's more essential than ever that patien... Read more

31 Jan 2020

Ranked #6

Podcast cover

Tips on Protecting Hospitals From Nation-State Attacks

Tips on Protecting Hospitals From Nation-State Attacks

In light of rising tensions between the U.S. and Iran, the Association of Executives in Healthcare Information Security ... Read more

22 Jan 2020

Ranked #7

Podcast cover

How to Think Like an Attacker

How to Think Like an Attacker

It's one thing to know your attackers. It's another to emulate some of their techniques so you can improve your own ente... Read more

29 Oct 2019

Ranked #8

Podcast cover

Analysis: Russian Hackers Hijack Iranian Hacking Tools

Analysis: Russian Hackers Hijack Iranian Hacking Tools

The latest edition of the ISMG Security Report analyzes how the Russian hacking group Turla has been coopting Iranian ha... Read more

25 Oct 2019

Ranked #9

Podcast cover

Risk Ranking Re-Evaluated

Risk Ranking Re-Evaluated

ISMG and Rapid7 kicked off a roundtable dinner series in San Francisco, where Rapid7's Scott King says the conversation ... Read more

4 Oct 2019

Ranked #10

Podcast cover

The Changing Role of DPOs

The Changing Role of DPOs

Data protection officers are assuming a more strategic role that goes beyond ensuring compliance with laws and regulatio... Read more

27 Sep 2019

Ranked #11

Podcast cover

Using Artificial Intelligence to Combat Card Fraud

Using Artificial Intelligence to Combat Card Fraud

Artificial intelligence is playing an important role in the fight against payment card fraud, says Gord Jamieson, senior... Read more

17 Sep 2019

Ranked #12

Podcast cover

Analysis: The Impact of Business Email Compromise Attacks

Analysis: The Impact of Business Email Compromise Attacks

This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens ... Read more

13 Sep 2019

Ranked #13

Podcast cover

A New Credential for Healthcare Security Leaders

A New Credential for Healthcare Security Leaders

A new professional credential aims to help healthcare organizations bolster their security leadership bench strength, sa... Read more

12 Aug 2019

Ranked #14

Podcast cover

Proactive Mobile Threat Defense

Proactive Mobile Threat Defense

From malware and phishing to cryptojacking and man-in-the-middle attacks, mobile threats are rampant, and organizations ... Read more

17 Jul 2019

Ranked #15

Podcast cover

The Future SOC: Harmonizing Detection and Response

The Future SOC: Harmonizing Detection and Response

The success of security operations centers will depend on how well they blend key technologies - including detection, us... Read more

12 Jul 2019

Ranked #16

Podcast cover

Legal Implications of the AMCA Data Breach

Legal Implications of the AMCA Data Breach

The relationship between American Medical Collection Agency and its laboratory clients affected by the company's data br... Read more

11 Jul 2019

Ranked #17

Podcast cover

The New Threat Intelligence

The New Threat Intelligence

Threat intelligence programs have evolved greatly over the past decade. But Mario Vuksan, CEO of ReversingLabs, says too... Read more

2 Jul 2019

Ranked #18

Podcast cover

Reinventing Security Awareness Training

Reinventing Security Awareness Training

Want to improve how your organization delivers and absorbs security awareness training? Then it comes down to reinventin... Read more

18 Jun 2019

Ranked #19

Podcast cover

Lack of Secure Coding Called a National Security Threat

Lack of Secure Coding Called a National Security Threat

The lack of secure coding is a pervasive and serious threat to national security, according to a new paper from the Inst... Read more

20 May 2019

Ranked #20

Podcast cover

Minimizing Cloud Security Risks

Minimizing Cloud Security Risks

Healthcare organizations need to take bold steps to help ensure that their cloud services providers are effectively prot... Read more

17 May 2019

“Podium: AI tools for podcasters. Generate show notes, transcripts, highlight clips, and more with AI. Try it today at https://podium.page”