Encryption & Key Management , Incident & Breach Response , ISMG Security Report
Why Hashed Passwords Aren't Implemented CorrectlyAudio Report: ISMG Editors Analyze the Latest Developments
The latest ISMG Security Report leads off with a segment in which Managing Editor Jeremy Kirk explains that the massive Yahoo breach not only exposed the accounts of a half-billion customers, but also the weaknesses in the way enterprises employ hashed passwords.
In the report, you'll also hear:
- Joshua Franklin, a cybersecurity engineer at the National Institute of Standards and Technology, urge organizations to take a much broader approach to secure the mobile ecosystem;
- BankInfoSecurity Executive Editor Tracy Kitten discuss with Verizon's Chris Novak and the PCI Security Standards Council's Stephen Orfei the rapid spreading of malware by cybercriminals; and
- An update on how well state chief information security officers keep their governors and legislatures informed about the cyber threats they face.
The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Be sure to check out our Sept. 20 and Sept. 23 reports, which respectively analyzes a new self-assessment tool that shows whether an enterprise's cyber-risk initiative aligns with its goals and strategy and a comparison of two widely varying estimates - $200,000 vs. $7 million for the cost of a data breach. The next ISMG Security Report will be Friday, Sept. 30.
Theme music for the ISMG Security Report is by Ithaca Audio under the Creative Commons license.