CISO Trainings , Endpoint Security , Governance & Risk Management
Getting the Bad Guys to Fund US Cyber Command's Growth
Also, Tips on Recruiting Scarce IT Security ProsThe ISMG Security Report leads with views on a novel way to fund the growth of the United States military's Cyber Command by seizing assets such as digital currencies from hackers and other criminals.
In the Security Report (click on player to listen), you'll hear:
- Strategic Cyber Ventures CEO Tom Kellermann put forward the idea used by law enforcement to raise funds to support their operations, this time to finance Cyber Command's cybersecurity initiatives;
- ISMG Security and Technology Editor Jeremy Kirk evaluate endpoint detection and response products;
- Joan Goodchild, who as ISMG's multimedia content director oversees CareersInfoSecurity, provide tips to recruit information security talent enterprises need, now; and
- About how automakers are tackling vehicular data privacy.
The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our Aug. 22 and Aug. 25 editions, which respectively include an analysis by information security guru Ron Ross on forthcoming changes to the National Institute of Standards and Technology's catalog of IT security and privacy controls and an evaluation of Donald Trump's approach to cybersecurity during the first seven months of his administration.
The next ISMG Security Report will be posted on Friday, Sept. 1.
Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.