Information Security Media Group recently attended the RSA Conference 2007, the premier information security conference representing more than 200 comprehensive educational sessions and close to 400 of the top vendors in the infosec industry. The following audio is a selection of recordings taken on the expo floor...
Listen to CUInfoSecurity’s latest podcast as a leading phishing researcher explains some of his newest findings on phishing. Dr. Markus Jakobsson is a professor at Indiana University, and a research fellow with the Anti Phishing Working Group (AWPG). Dr. Jakobsson is also Associate Director of the Center of...
Listen to CUInfoSecurity’s latest podcast as a leading phishing researcher explains some of his newest findings on phishing. Dr. Markus Jakobsson is a professor at Indiana University, and a research fellow with the Anti Phishing Working Group (AWPG). Dr. Jakobsson is also Associate Director of the Center of...
Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our IT risk assessments webinar. See below for a sampling of the questions asked.
Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our Preparing for a Regulatory IT Exam webinar. See below for a sampling of the questions asked.
A former FBI agent/computer specialist, Schmidt is one of the world’s top information security luminaries who helped lead the escalating war against cybercrime. He is one of the most credible and influential names in information security, and was Microsoft’s CSO and later eBay’s CISO. He’s...
The SANS Institute is the largest source for information security training and certification in the world. CUInfoSecurity.com recently interviewed Alan Paller, Director of Research for SANS and probed his views on information security and cyber threats facing financial institutions.
As Director of Research for the...
A world authority on software and application security, Gary McGraw, PhD and CTO of Cigital, carries the software security torch. Over the past 11 years his six books on the subject of software security seem to have touched off a revolution. Security people who once relied solely on firewalls, intrusion detection, and...
Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our information security for board members and senior management webinar. See below for a sampling of the questions asked.
Brent discusses deploying multi-factor authentication to mega-enterprises with millions of end-users, knowledge-based authentication user enrollment, and how educational institutions are utilizing multi-factor authentication solutions.
If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.
Every organization is concerned about malware - how it evolves, slips past multilayered defenses and infects networks. John Nielsen, Product Manager for IBM Mobile Security, discusses the latest malware trends and steps organizations may take to fight back.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.