When physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, Jonathan Cohen of Synchronoss explains in this video interview.
The security of any organization can be rated based on careful research of information available on the public internet and the dark web, Sam Kassoumeh of SecurityScorecard explains in this video interview.
Ransomware has been one of the highest-profile cybercrimes of 2016, and the FBI has been at the heart of many investigations. Jay Kramer, a supervisory special agent with the bureau, discusses what he's learned about defending against ransomware in this video interview.
It's been a hot topic for years, but we are still only in the earliest stages of ensuring medical device security, according to expert Kevin Fu of Virta Laboratories. In this video interview, Fu discusses how this focus will evolve in 2017.
Enterprises should employ new modeling, simulation and intelligence tools to provide insight into potential exploitable attack vectors before an incident occurs, Michelle Cobb, vice president at Skybox Security, says in a video interview.
As the U.S. ramps up its migration to EMV chip payments over the next three to five years, fraudsters will shift their attention to mobile wallets, says Al Pascual of Javelin Strategy & Research, who describes why in this video interview.
Ransomware gangs increasingly target organizations - including hospitals and banks - that might be able to recover from such attacks, but not in a timely manner, says Verizon's Mark Rasch. Learn how well-honed incident response plans can help.
Too often when organizations get shaken down by online criminals, they panic, and in the process make the predicament they're facing even worse, warns digital forensic investigator Ondrej Krehel in this video interview.
In this video interview, Global Cyber Alliance CEO Phil Reitinger explains how the vastness and complexity of the internet creates cyber vulnerabilities, but one day those same characteristics, if used properly, could mitigate cyber threats.
Agari's John Wilson doesn't just fight email fraud schemes - he also is the occasional target. What have the fraudsters inadvertently taught him about their latest tactics? And how can these lessons help organizations to improve their defenses? Find out in this video interview.
Organizations are increasingly centralizing their fraud programs. Why? To reap the benefits of having a unified fraud management team and a single strategy to detect and prevent fraud, says Genevieve Gimbert, a principal in PwC's financial crimes unit, in this video interview.
Banks need to develop customer authentication strategies that meet demand for strong security as well as convenience, says Mary Ann Miller of NICE Actimize, who describes emerging multifactor approaches in this video interview.
In today's environment, federal and state regulators come at breached companies from all angles, with requests for investigative information, breach response plans and fines. Attorney Deborah Gersh explains why so many agencies stake their claims in breach response.
To facilitate faster decision-making, better cost control and increased transparency, many organizations now task a single executive to oversee all security, privacy and risk functions, says ADP's Roland Cloutier.
In the wake of the recent hack of the Bitfinex bitcoin exchange, the stability and security of cryptocurrency is again being questioned. In this video interview, cryptocurrency expert Robert Schwentker contends the attack, and others like it, could lead to regulation of cryptocurrencies.