Governance & Risk Management , Incident & Breach Response , Insider Threat
What's Behind WikiLeaks' Release of CIA Hacking Files
Also, Tackling the Rise of Attacks Targeting Internet of ThingsLeading the latest edition of the ISMG Security: A deep dive into the WikiLeaks release of thousands of documents that appear to lay open in detail the CIA's computer hacking techniques Report.
In the Security Report, you'll hear (click on player beneath image):
- ISMG Security and Technology Managing Editor Jeremy Kirk analyze various elements of the CIA hack, including the possibility of an insider - perhaps a millennial - pilfering the agency's files.
- DataBreachToday Executive Editor Mathew J. Schwartz explore how organizations can defend against attacks on the internet of things in their networks.
The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our March 3 and March 7 reports that respectively analyze legislation before Congress that would strengthen the influence of the National Institute of Standards and Technology on federal civilian agencies and the return of the Crypt0L0cker ransomware.
The next ISMG Security Report will be posted on Tuesday, March 14.
Theme music for the ISMG Security Report is by Ithaca Audio under the Creative Commons license.