We retired this podcast, because we couldn't parse it for 10 consecutive times.
Date | Title & Description | Contributors |
---|---|---|
2020-10-15 | “Every cloud conversation should be also a security conversation,” says Anna Van Wassenaer, Cloud Business Development Leader, Europe, for IBM Security Services. Abhijit Chakravorty, Partner & Cloud Security Competency Leader for IBM Security, joi... |
|
2020-08-26 | "The idea of chaos engineering is essentially to help test resilience before an accident happens," says Itzik Kotler, co-founder and CTO of SafeBreach. Kotler joins Matthew Dobbs, Chief Integration Architect for the IBM Security Command Center, for a... |
|
2020-08-06 |
Time Is (Still) Money and Other Findings from the 2020 Cost of a Data Breach Report What are the top findings from the Cost of a Data Breach Report 2020? Charles DeBeck, a cyber threat intelligence expert with IBM X‑Force IRIS, talks about what drives costs higher for some organizations. "We observed a growing divide between organizat... |
|
2020-07-30 | The threat landscape has changed as a result of the global pandemic. What does that mean for organizations and their employees? How can leaders "manage through chaos" successfully? Hosts Pam Cobb and David Moulton reflect on these questions by drawing ... |
|
2020-07-09 | As digital transformation accelerates, so does the importance of verification. "I think it's become more important right now to ensure the right person has access to the right data and apps at the right time under the right circumstances," says Aarti B... |
|
2020-07-02 | "APT groups jump at the chance to take advantage of people's emotions," says Ryan Castillo, an analyst on the threat hunt and discovery team within IBM X‑Force IRIS. One such advanced persistent threat (APT) group has recently been detected mining the ... |
|
2020-05-12 |
Consumer Identity and Access Management (CIAM): Reducing Friction Without Reducing Security If you introduced yourself at a dinner party and a short time later the host forgot your name, maybe you'd be confused and a little frustrated. The same goes for consumers when interacting with a brand, signing up or verifying their identity. "That kin... |
|
2020-04-07 | ITG08, which shares overlap with the group FIN6, is a financially motivated threat group known for currently targeting e-commerce platforms. Chris Caridi from IBM's Threat Intelligence Production Team and Ole Villadsen from the Threat Hunt and Discover... |
|
2020-03-17 | Human beings have inherent biases. That's all the more reason to make an effort to be "consciously unbiased" when developing artificial intelligence (AI). "When we build AI technology for mission-critical applications like security...we don't get to us... |
|
2020-02-11 | Every year, IBM Security releases the X-Force Threat Intelligence Index. When asked what finding surprised him most from the 2020 report, Charles DeBeck, senior cyber threat intelligence researcher, highlighted OT security. "We saw threat actors in 201... |
|