Security Intelligence Podcast artwork

Security Intelligence Podcast

189 episodes - English - Latest episode: over 3 years ago - ★★★★★ - 34 ratings

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.

For even more security content, visit https://securityintelligence.com.

095940

Technology
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Developing a Cloud Security Strategy

October 15, 2020 15:15 - 26 minutes - 23.1 MB

“Every cloud conversation should be also a security conversation,” says Anna Van Wassenaer, Cloud Business Development Leader, Europe, for IBM Security Services. Abhijit Chakravorty, Partner & Cloud Security Competency Leader for IBM Security, joins Van Wassenaer for a conversation about why cloud strategy should go hand-in-hand with a security strategy. The conversation covers the cloud threat landscape; balancing CISO, CIO and developer objectives for cloud migration; and advice on where t...

Training with Chaos Engineering

August 26, 2020 13:21 - 32 minutes - 27.1 MB

"The idea of chaos engineering is essentially to help test resilience before an accident happens," says Itzik Kotler, co-founder and CTO of SafeBreach.  Kotler joins Matthew Dobbs, Chief Integration Architect for the IBM Security Command Center, for a conversation about the value of testing systems and people through "dynamic but controlled chaos." They discuss training for the shifting adversary landscape and TTPs, who benefits from chaos engineering training, and what makes for a good simu...

Time Is (Still) Money and Other Findings from the 2020 Cost of a Data Breach Report

August 06, 2020 11:31 - 24 minutes - 17.8 MB

What are the top findings from the Cost of a Data Breach Report 2020? Charles DeBeck, a cyber threat intelligence expert with IBM X‑Force IRIS, talks about what drives costs higher for some organizations. "We observed a growing divide between organizations that were well prepared and organizations that weren't," DeBeck says. DeBeck covers more highlights from the report, including top root causes such as cloud misconfiguration and compromised credentials. He also shares what the study found ...

Security Highlights from IBM Think Digital 2020

July 30, 2020 17:50 - 15 minutes - 13.9 MB

The threat landscape has changed as a result of the global pandemic. What does that mean for organizations and their employees? How can leaders "manage through chaos" successfully? Hosts Pam Cobb and David Moulton reflect on these questions by drawing on insights from speakers at IBM Think Digital 2020.  See the full sessions referenced in the episode: Address New Cybersecurity Risks - https://www.ibm.com/events/think/watch/replay/126550847/ Detect & Respond to Accelerating Threats - https...

Contextualizing Zero Trust

July 09, 2020 12:34 - 27 minutes - 31 MB

As digital transformation accelerates, so does the importance of verification. "I think it's become more important right now to ensure the right person has access to the right data and apps at the right time under the right circumstances," says Aarti Borkar, Vice President, OM, for IBM Security. "And to me that's Zero Trust." Borkar returns to the podcast to explore the connection between verification, context and successful applications of Zero Trust — or in other words, "Never trust, alway...

Recent Activity from ITG16, a North Korean Threat Group

July 02, 2020 12:31 - 18 minutes - 24.7 MB

"APT groups jump at the chance to take advantage of people's emotions," says Ryan Castillo, an analyst on the threat hunt and discovery team within IBM X‑Force IRIS. One such advanced persistent threat (APT) group has recently been detected mining the "treasure trove of COVID-19 lures" activated by overall uncertainty and misinformation in the face of the global pandemic. Castillo and Joshua Chung, a strategic cyber intel analyst for IBM X-Force IRIS, join the hosts to discuss recent activit...

Consumer Identity and Access Management (CIAM): Reducing Friction Without Reducing Security

May 12, 2020 13:20 - 25 minutes - 20.2 MB

If you introduced yourself at a dinner party and a short time later the host forgot your name, maybe you'd be confused and a little frustrated. The same goes for consumers when interacting with a brand, signing up or verifying their identity. "That kind of experience is something we see on a regular basis in many consumer applications where you're asking for information that isn't necessary or maybe you already have and should not be asking again," says Sean Brown, Program Director for IBM's ...

Exploring the Impact of the ITG08 Threat Group

April 07, 2020 12:26 - 27 minutes - 22.4 MB

ITG08, which shares overlap with the group FIN6, is a financially motivated threat group known for currently targeting e-commerce platforms. Chris Caridi from IBM's Threat Intelligence Production Team and Ole Villadsen from the Threat Hunt and Discovery team of IBM X-Force IRIS join the hosts to explore research around the threat group. The conversation covers a discussion of advanced persistent threats (APTs); ITG08's tools, techniques and procedures (TTPs); and how organizations can effect...

Creating AI Without Bias

March 17, 2020 11:39 - 35 minutes - 32.9 MB

Human beings have inherent biases. That's all the more reason to make an effort to be "consciously unbiased" when developing artificial intelligence (AI). "When we build AI technology for mission-critical applications like security...we don't get to use that excuse of being unconsciously biased," said Aarti Borkar, Vice President of OM for IBM Security. Borkar joined the podcast for a conversation about steps in developing unbiased AI, why subject matter experts are instrumental in the proce...

Current Trends In The Threat Intelligence Landscape

February 11, 2020 12:08 - 32 minutes - 37.7 MB

Every year, IBM Security releases the X-Force Threat Intelligence Index. When asked what finding surprised him most from the 2020 report, Charles DeBeck, senior cyber threat intelligence researcher, highlighted OT security. "We saw threat actors in 2019 much more actively targeting the operational technology field than we saw in any previous year," he said. At the same time that threat actors are leveraging new targets, previously identified trends continue to have traction: ransomware, phis...

Verify To Simplify: Demystifying Zero Trust

January 28, 2020 14:35 - 34 minutes - 39.6 MB

Nearly a decade ago, Forrester championed the concept of "Zero Trust." Fast forward to today, and the industry is seeing a confluence of technology and strategy that has pushed Zero Trust from the theoretical realm into the practical. In brief terms, Zero Trust boils down to "never trust, always verify." Forrester analyst Chase Cunningham joins the podcast to dig into the depths behind that definition, including how the concept evolved, why the journey towards Zero Trust needs to begin with ...

Gender Diversity in Security

December 17, 2019 11:21 - 30 minutes - 17.7 MB

"It's work to put together and come up with a diverse panel," co-host Pam Cobb observes about her work in the cybersecurity industry. "And diversity here is not just male and female. It is backgrounds and ways of thinking, and all of the different ways that we think of diversity." Bestselling author and entrepreneur Jane Frankland, whose company Cyber Security Capital focuses on gender inclusion in science, joins the podcast for a discussion about diversity in cybersecurity, particularly rec...

Cyber Resilience for State and Local Governments

November 12, 2019 12:45 - 27 minutes - 32 MB

"State and local governments’ IT infrastructure is currently in a state of what we would call transformative change...making information technology now a primary medium for citizens to interact with their local government," explains Claire Zaboeva, an expert in identifying and assessing cyber-based threats for IBM X-Force IRIS. For all the benefits these changes bring, there's a flip side: there are now more vectors for threat actors to conduct malicious activities within government infrastru...

Ransomware and Operating Under Maximum Pressure

October 15, 2019 10:53 - 32 minutes - 37.1 MB

Recovering from a ransomware attack isn't like paying your electric bill; there's no guarantee that the lights suddenly come back on. How, then, should organizations like municipalities and hospitals plan to remediate in the case of a ransomware attack — or better yet, take preventative security measures? Matthew DeFir and Robert Gates, both members of the IBM X-Force IRIS team, share their advice on how organizations can prevent ransomware attacks. They discuss why attackers choose moments ...

Cloud Security and the Road to Transformation

September 10, 2019 11:04 - 35 minutes - 40.4 MB

Cloud is not the ultimate destination; it's the path to an end goal. "The idea of cloud is to get you a modern architecture," says Vikram Chhabra, who leads product management for IBM Security Services with a focus on cloud and infrastructure security. "The destination is transformation to help you innovate and drive modern experiences for your end customers." Chhabra identifies multiple challenges as CISOs steer their businesses down this path to a modern architecture: talent, cloud control...

Are You Prepared to Respond to a Destructive Malware Attack?

August 06, 2019 11:03 - 37 minutes - 43.3 MB

What’s the difference between a destructive attack and a traditional breach? “Destructive malware is malicious software that has the capability to render an effective system inoperable and also challenges reconstitution,” explains Charles DeBeck, a senior cyber threat intelligence researcher at IBM X-Force IRIS. A kind of attack originally associated with nation-states, new research suggests an expanding trend in who is employing destructive attacks, and where. Wendi Whitmore, director of t...

Adapting to Evolving Data Privacy Regulations

July 30, 2019 10:51 - 25 minutes - 29.6 MB

As regulations such as GDPR and CCPA go into effect around the world, organizations are seeing the impact of data privacy laws on their businesses. As recent headlines show, fines are one possible impact, but they shouldn't be the only impetus to review privacy compliance and run through incident response plans.  "It really comes down to a matter of trust," says Monica Dubeau, privacy program director for IBM Security. "You need your clients to trust you. You want your clients to trust you. ...

What Factors Contribute to the Cost of a Data Breach?

July 23, 2019 10:39 - 29 minutes - 33.7 MB

On average, according to the 2019 Cost of a Data Breach Report, it takes 279 days to contain a data breach, up from 266 days last year. "I think it's true we're getting better identifying data breaches," says Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. However, at the same time as organizations improve their security postures, cybercriminals are becoming stealthier.  While factors such as a lack of preparedness or third-party risk can amplify the cost of a data breach, ...

The Evolving Security Operations Center

July 16, 2019 10:41 - 36 minutes - 42 MB

"I think we've really seen the concept of a SOC grow and evolve over the past 10 years or so," says Emma Bickerstaffe, Senior Research Analyst at the Information Security Forum. As your business and the threat landscape change, how do you keep pace with your security operations center (SOC)?    Bickerstaffe and Jamie Cowper, Product Marketing Manager at IBM Security, join the podcast for a discussion about building and enhancing a SOC, or "the eyes and ears of an organization." They cover bus...

Reducing Third Party Risk

June 25, 2019 10:49 - 34 minutes - 40.3 MB

"We, as CISOs, and as risk management practitioners, and as risk executives, have to be aware that a risk rating vendor isn't the entire answer to our risk posture," says Shamla Naidoo, a Managing Partner at IBM Security who was most recently the global CISO for IBM. "It is a part of the answer, not the entire answer."  Naidoo joins David to discuss taking a 360 degree view of third party risk. They explore why risk rating reports are the beginning of risk management but not the end; why tru...

Development Agility and Open Source Vulnerability Prioritization

June 18, 2019 11:12 - 29 minutes - 34.1 MB

"Open source is increasingly being acknowledged as an indispensable means for promoting and driving innovation," says Rami Elron, Senior Director of Product Management at WhiteSource. But at the same time, there's been a proliferation in open source security vulnerabilities.  Elron attributes the phenomenon to both increased adoption of open source and increased attention following publicized data breaches. He joins David to discuss the challenges in prioritizing open source vulnerabilities,...

Lateral Movement: Combating High-Risk, Low-Noise Threats

June 11, 2019 15:05 - 30 minutes - 35.2 MB

"What I like to tell people is that when you have one computer that's infected, that's annoying," says Charles DeBeck, a member of IBM Security's Threat Intelligence Production team. "When you have 1,000 computers that's infected, that's a problem." Lateral movement is one way threat actors escalate annoyances into problems. "Lateral movement consists of a series of techniques that enable an adversary to access and control remote systems in a network," Joey Victorino, a consultant for IBM X-...

Travel Security: Why Data Safety Doesn't Get a Day Off

May 28, 2019 11:35 - 20 minutes - 17.3 MB

Sunscreen? Check. Boarding pass? Got it. The resolve not to connect to the airport WiFi? Getting there.   This summer, add cyber hygiene best practices to your travel checklist. Caleb Barlow, Vice President of X-Force Threat Intelligence for IBM Security, shares insights on travel and transportation industry security. Caleb explains why the transportation industry is a target for attackers and how individual travelers can protect their personal information. Pam and David discuss the tension ...

Lessons from a Gray Beard: Transitioning from the Military to Cybersecurity

May 14, 2019 10:31 - 35 minutes - 22.8 MB

With thirty years of experience in the military, JC Vega now shares his experiences as a "gray beard" in the role of a cyber range coach. When asked about transitioning from the military to cybersecurity, JC offers advice that applies across fields: consider a path that lets you prioritize quality of life, career advancement, and job satisfaction however best suits your personal goals. JC explains why military veterans possess innate security training, shares lessons learned from participant...

Foundations for a Winning Operational Technology (OT) Security Strategy

May 07, 2019 09:59 - 22 minutes - 16.3 MB

Conversations about operational technology (OT) security have been bubbling up more and more, and justifiably so. The term may not be as well known as it should be — or even entirely settled upon yet — but the consequences of risk in operational technology environments impact our daily lives. As Rob Dyson, OT Security Services Leader for IBM Security, explains, "These are environments that produce things that keep our economies going every day, whether it's our electricity, water or manufact...

"You Can Never Have Too Much Encryption"

April 30, 2019 10:50 - 31 minutes - 26.6 MB

Data encryption can feel like the enterprise version of a kid's least favorite chore: cleaning their room. "One of the biggest challenges," says Stephanie Balaouras, "is just the inertia against getting started." Considering the ways in which a holistic encryption strategy can reduce security and privacy concerns, breaking through the inertia is worth it. Balaouras, Research Director at Forrester Research, joins Pam and David for a conversation on how to get started on your data encryption s...

Automating Cyber Resilience Best Practices with Dr. Larry Ponemon

April 23, 2019 10:59 - 26 minutes - 30.1 MB

What does it take to be cyber resilient? In the words of Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, a cyber resilient enterprise is "one that can prevent, detect, contain, and recover from a myriad of serious threats against data applications and IT infrastructure." Dr. Ponemon joins co-hosts Pam Cobb and David Moulton to discuss findings of the 2019 Study on the Cyber Resilient Organization. He explains why Germany stands out as a case study for cyber resilience and h...

Muscle Memory and Cyber Fitness Training

April 16, 2019 11:03 - 32 minutes - 28.4 MB

Just as physical training improves strength and health, cyber fitness training keeps security professionals in shape to handle a breach at a moment's notice—prepared to duck "that virtual cyber punch in the face."  Caleb Barlow, Vice President of IBM Security's X-Force Threat Intelligence group, discusses the importance of going beyond tabletop exercises when training teams to respond to breaches: "The more we can immerse people into what that's going to look like, the better we can train th...

Three Identities Walk into a Bar…

April 09, 2019 10:51 - 30 minutes - 19.3 MB

When you think of identity and access management (IAM), what comes to mind? For guest Bert Vanspauwen, it's the metaphor of a bar. Before ordering a drink, you need to prove to the bartender that you're of age. Rarely do you see someone walk up to the bar with their driver's license, social security, and passport in hand—why give your full identity when the only thing between you and a drink is your age?  In his experience working with a European team of IAM experts at IBM Security, Bert see...

Digital Identity Trust, Part 3: Powering Digital Growth With Digital Identity Trust

January 10, 2019 14:38 - 10 minutes - 9.22 MB

Accelerating growth without sacrificing security — this may be the holy grail of digital transformation. Jason Keenaghan, director of offering management for IBM's identity and access management (IAM) and fraud portfolio, joins this episode of our digital identity trust series to discuss how organizations can effectively identify and authenticate end users without introducing extra complexity or friction. Listen to the complete series at ibm.co/2M2Ixol and learn more about IBM Trusteer at ib...

Monitoring Cybersecurity Trends With Former NSA Deputy Director Bill Crowell

January 08, 2019 11:40 - 24 minutes - 22.7 MB

Do you have concerns about election security or other issues of national cybersecurity? If so, don't miss this episode, in which former National Security Agency (NSA) Deputy Director Bill Crowell shares his insights and expertise. Listen in for a conversation in which we tackle critical questions around national cybersecurity, emerging enterprise threats, and strategies for organizations to improve their security outlook. To learn more about the benefits of encryption, read the IBM white pa...

X-Force Red In Action 011: Spotlight on Password Security With Evil Mog

December 27, 2018 13:45 - 13 minutes - 12.5 MB

As we prepare to enter 2019, are passwords on their way to obsolescence? Dustin Heywood, a.k.a. Evil Mog, says no. Heywood brings his expertise as a penetration tester and password cracker to this episode of the X-Force Red in Action series [ibm.co/2lUG2YQ]. Listen in for valuable tips on how to improve password security in your organization.

Demystifying the Role of AI in Cybersecurity

December 20, 2018 14:35 - 21 minutes - 19.4 MB

Artificial intelligence (AI) has been making headlines for several years now, but what's the story behind the hype? And what opportunities and risks does AI present for the security industry in particular? In this episode we're demystifying AI in cybersecurity with the help of three IBM experts: Carma Austin, Worldwide Sales Leader, Security Intelligence SaaS; Doug Lhotka, Executive CyberSecurity Architect, CISSP-ISSAP; and Jeff Crume, IT Security Architect, Distinguished Engineer and IBM Ma...

Fraud Trends, Digital Transformation and More — 2018 Cybersecurity Wrap-up with Limor Kessem

December 18, 2018 12:35 - 7 minutes - 7.1 MB

What cybercrime threats dominated 2018, and how can we be better prepared to protect our critical data, empower digital transformation and drive stronger business outcomes in 2019? These are the questions that IBM Security Global Executive Security Advisor Limor Kessem [https://ibm.co/2EwNa8a] answers in our 2018 cybersecurity wrap-up episode. To learn more about how to accelerate growth and digital adoption with seamless identity trust, visit https://ibm.co/2CkLCga.

X-Force IRIS' Kat Tasiopoulou Envisions the Future of Incident Response

December 13, 2018 14:38 - 9 minutes - 8.97 MB

Meet Kat Tasiopoulou. For the past year, Kat has worked on the IBM X-Force Incident Response and Intelligence Services (IRIS) team as a client engagement lead, helping clients train and prepare for proactive incident response. In this episode, Kat discusses her multifaceted X-Force IRIS role, shares how it felt to win the British Computer Society (BCS) 2018 'Young IT Professional of the Year' award, and makes predictions for the future of incident response. To learn more about X-Force IRIS...

Cybersecurity Challenges Facing Telecommunications and Media Entertainment

December 11, 2018 14:16 - 24 minutes - 22.8 MB

Telecom and media entertainment enterprises serve millions of customers and handle massive volumes of sensitive data. Unsurprisingly, these industries also face unique cybersecurity challenges. Klint Borozan, IBM worldwide security industry leader, joins this episode for a look at how telecom and media companies are handling growing security concerns while managing complex infrastructure, safeguarding valuable data and improving information security policies. Find more industry-focused podc...

X-Force Red In Action 010: Spotlight on Phishing Awareness With Chris Sethi

December 06, 2018 16:43 - 12 minutes - 11.9 MB

Worried about phishing attacks this holiday season? Senior security consultant Chris Sethi joins this episode of our ongoing X-Force Red in Action series [ibm.co/2lUG2YQ] to discuss how companies like yours can promote phishing awareness to limit overall risk and protect critical data and assets. For more information on X-Force Red, visit ibm.com/xforcered, and check https://securityintelligence.com/xforcered regularly for new X-Force Red in Action podcast episodes.

Digital Identity Trust, Part 2: Security Without Sacrificing Customer Experience

December 04, 2018 12:20 - 13 minutes - 12.4 MB

How can enterprises deliver the frictionless experience customers demand without compromising security? This is one of the critical questions IBM Trusteer sales leader Shaked Vax takes on in part 2 of our digital identity trust podcast series (find the rest of the series at https://ibm.co/2M2Ixol). Listen in to learn how your organization can establish the foundation it needs to create effective threat prevention logic without under- or overburdening users along their digital experience jou...

Forrester Analyst Heidi Shey Dives Deep Into Data Discovery and Classification

November 27, 2018 17:36 - 23 minutes - 21.2 MB

If you're seeking an in-depth look into data discovery, classification and the future of corporate big data strategies, don't miss this podcast episode featuring Forrester data analyst Heidi Shey. Listen now, and read the complete Forrester report, "Rethinking Data Discovery & Classification Strategies" [https://ibm.co/2BzDBDE] to learn even more.

Incident Response 2020: Cyberthreat Training Goes Mobile with the X-Force Command C-TOC

November 20, 2018 12:42 - 7 minutes - 6.78 MB

Cyberattacks can happen anywhere and at any time. IBM Security recently made a giant leap toward leveling the playing field with its new Cyber Tactical Operations Center (C-TOC), a fully mobile cyberthreat training simulator modeled after the tactical and incident command centers used by the military and first responders. In this episode, IBM X-Force Threat Intelligence Global Partner and Director Wendi Whitmore details the critical roles of the C-TOC and IBM X-Force Incident Response and In...

Examining the State of Retail Cybersecurity Ahead of the 2018 Holiday Season

November 15, 2018 13:00 - 11 minutes - 10.7 MB

We all know that retail cyberattacks increase during the holiday season. So, how can companies keep e-commerce sites secure over the holidays and into the new year? In this episode of the podcast, we examine the current state of retail cybersecurity and review some best practices for the holiday season with the help of retail security expert Justin Ball, . Find more industry-focused podcasts at ibm.co/2NAY02M. And to discover how IBM Security provides fast, integrated and efficient soluti...

Embracing the Paradox of Open Source Security

November 01, 2018 11:58 - 19 minutes - 17.9 MB

Is your organization struggling with the paradox of open source? Open source vulnerabilities are gaining publicity, data breaches are on the rise, and data privacy is paramount. And yet, at the same time, open source accelerates productivity in a way that's impossible with proprietary software. Rami Elron, senior director of product management at WhiteSource, and David Marshak, senior offering manager for application security at IBM Security, discuss this paradox in today’s podcast. Liste...

X-Force Red In Action 009: Spotlight on Vulnerability Management With Krissy Safi

October 30, 2018 12:35 - 14 minutes - 13.5 MB

With data volumes skyrocketing and scanning solutions reporting thousands or even millions of potential vulnerabilities, how can organizations identify high-priority threats and reduce total risk? Krissy Safi joins this episode of our ongoing X-Force Red in Action series [https://ibm.co/2lUG2YQ] to discuss the growing challenges of vulnerability management, the benefits of a risk-based approach, and how X-Force Red can help enterprises prioritize threats and reduce of impact of attacks. To ...

Understanding the Industrial IoT and its Cybersecurity Implications

October 25, 2018 13:27 - 14 minutes - 13.6 MB

Implementing industrial Internet of Things (IIoT) devices can help improve efficiency and boost worker safety, but – no big surprise – it also comes with potential cybersecurity challenges. Yet prior to the release of a new IBM Institute for Business Value (IBV) study, specific data on IIoT security was conspicuously absent. In this podcast, three experts from the IBM IBV discuss the growing cybersecurity impact of IIoT adoption and the findings of their two new reports, "Automotive Industri...

How To Get the Most Out of Your Identity and Access Management Solution

October 18, 2018 14:29 - 18 minutes - 16.9 MB

Identity and access management (IAM) is now a fundamental part of any cybersecurity program, and yet two-thirds of organizations don't have an IAM solution that secures business assets, supports digital transformation and enables digital trust. In this episode of the podcast, IAM experts Dustin Hoff and Bert Vanspauwen discuss the state of the industry and look at why design thinking is critical to delivering value-driven IAM. Visit https://ibm.co/2S1FOhF to learn more about identity and ac...

What is the Future of Endpoint Management in the Enterprise?

October 11, 2018 12:43 - 22 minutes - 20.4 MB

Forrester analyst and unified endpoint management (UEM) expert Andrew Hewitt joins today’s podcast to share his insights on the current state of endpoint management and its future in the enterprise. Listen now to better understand the evolution of endpoint management and what’s driving the present uptick in adoption of UEM solutions. You’ll also get a glimpse into the months and years ahead with Hewitt’s predictions of which devices will next be integrated into UEM. To learn more, visit htt...

Digital Identity Trust, Part 1: Securing Digital Transformation

October 09, 2018 11:58 - 6 minutes - 5.81 MB

The push for digital transformation has shifted the way many organizations are approaching cybersecurity fraud. Companies today must balance the need for fraud and risk reduction against evolving customer expectations and the functionality of always-connected apps and services. In this podcast, IBM’s Rob Rendell draws on his many years of experience in fraud prevention to share valuable advice for companies looking to build digital identity trust and embrace digital transformation. Stay tun...

X-Force Red In Action 008: Spotlight on National Cyber Security Awareness Month With Space Rogue

October 02, 2018 12:10 - 17 minutes - 15.7 MB

What's even scarier than Halloween? The vast array of cyberthreats facing organizations today. October is National Cybersecurity Awareness Month (NCSAM) in the United States, and who better to speak about securing end-user devices than X-Force Red's very own Space Rogue? In this edition of the X-Force Red in Action podcast series, he outlines must-have security basics and offers best practices for protecting connected devices and managing small business risk. Listen now to discover the 3 "p...

Why It's Time To Embrace the Potential of Privileged Access Management Solutions

September 27, 2018 12:08 - 15 minutes - 13.9 MB

Fifty-four percent of organizations today still use paper- or Excel-based processes to manage credentials. This remarkable statistic reveals that privileged access management (PAM) remains a significant challenge. The good news is Dustin Hoff and Bert Vanspauwen of IBM Security are here to break down the problem of privileged access security gaps and to introduce IBM's new privileged access management-as-a-service (PAMaaS)offering. To learn more, read the blog, "Protect Your ‘Matrix’ With S...

Tackling the Key Challenges of Federal Cybersecurity

September 25, 2018 12:53 - 22 minutes - 20.2 MB

For federal agencies, every cyberthreat is credible — and improving data security must therefore be a top priority. In this edition of our industry podcast series, Ian Doyle, business unit executive for cybersecurity strategy and growth initiatives at IBM, joins host Bill Venteicher to break down the challenges policy makers and decision makers are facing in federal cybersecurity. Find more industry-focused podcasts at https://ibm.co/2NAY02M. And to discover how IBM Security provides fast, ...

Guests

Eric Cole
1 Episode