Security luminary Bruce Schneier and former cybersecurity czars Amit Yoran and Gregory Garcia share their views on a possible new White House cybersecurity czar. UK-based Paul Wood, senior analyst at Symantec’s MessageLabs, gives the international perspective.
SearchSecurity.com editors discuss whether the Berkeley data breach warranted so much news coverage and whether people are becoming desensitized to data breaches. Also, Heartland Payment Systems’ push for better industry wide security and whether software vendors should push silent updates to users.
AT&T Labs’ Brian Rexroad shares how the telecommunications giant detects and defends its network against botnets. Rexroad talks about the most prevalent botnets being monitored, including Conficker, how privacy concerns strain detection and eradication efforts and explains how future technologies could be used to battle the cybercriminals behind the threat. Rexroad is principal architect at AT&T Labs.
SearchSecurity’s Carolyn Gibney interviews David Foote of Foote Partners LLC about the firm’s latest skills and certification pay research. Some security skills are holding their own in the tough economy.
In this edition, SearchSecurity editors talk about the electrical grid compromise, restructuring of the federal cybersecurity authorities, who to blame for the Conficker hype and recent criticisms of the Payment Card Industry Data Security Standard.
Trend Micro buys Third Brigade. Also Agile Risk Management’s Matthew Shannon talks about incident response best practices, including ways to accelerate the process, how compliance enables better incident response, and what makes a successful incident response.
Video: Security incident response 101:
Even the best procedures fail to overcome the stresses in the initial throes of an incident. Security consultant Lenny Zeltser explains how to run a well coordinated response.
Listen to the top security experts and learn about the latest cybersecurity research. Whether it’s the spread of malware, the explosion of spam or hackers exploiting flaws to steal sensitive data, this podcast series aims to find the right ways to defend against ongoing attacks to your systems.