Informações:
Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Patrick Bedwell
05/03/2011Patrick discusses how to consolidate network traffic monitoring into a single appliance and management console, along with web application security and PCI compliance.
-
Overlooked Breach Prevention Steps
28/02/2011Terrell Herzig, information security officer at UAB Medicine, pinpoints frequently overlooked breach prevention steps.
-
Cybersecurity: Firewalls Are Easy to Pierce
15/02/2011The 451 Group's Joshua Corman says merely complying with stagnant standards won't ensure security.
-
Shifting to Hardware-Based Encryption
14/02/2011Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
-
Five HIPAA Compliance Tips
11/02/2011Security expert Raj Chaudhary offers five tips for keeping health information private.
-
Breach Disclosure: New Laws, Higher Standard
03/02/2011Wells Fargo's Alexander says breach disclosure laws are getting tougher.
-
The ROI of Security Compliance
31/01/2011Tripwire's Shenoy says security compliance improves the bottom-line.
-
Selecting a Data Loss Prevention App
27/01/2011Security specialist Rebecca Herold says data loss prevention software can play a critical role in preventing information breaches.
-
The 'Human Side' of EHR Security
21/01/2011Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.
-
HITECH: Security Reminder for Clinics
19/01/2011Clinics applying for HITECH Act electronic health records incentive payments are getting a reminder about the importance of information security, says Robert Tennant of the Medical Group Management Association
-
National Breach Warning System Urged
17/01/2011When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
-
Security Spending Up at Rural Hospital
20/12/2010Ron Kloewer, CIO at 25-bed Montgomery County Memorial Hospital, explains why the critical access facility's spending on information security will grow in 2011.
-
WikiLeaks Backlash: 'We Are Going to Take You Down'
10/12/2010Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
-
Lessons Not Learned from WikiLeaks
06/12/2010"Until they personally suffer pain, they don't think it is something that can happen to them," says Eric Cole, an insider threat expert and SANS Institute faculty fellow.
-
A CIO Calls for Security Vigilance
03/12/2010Community hospitals must become more vigilant about information security, especially as they apply for federal electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
-
WikiLeaks: "It's a Major Wake-up Call"
01/12/2010The recent WikiLeaks release of thousands of sensitive government documents puts security leaders on notice: The breach threat is real, and no organization is immune.
-
GRC Agenda for 2011
23/11/2010SAP's Norman Marks: Governance, risk, compliance can improve business.
-
How to Build a Culture of Privacy
19/11/2010Staff training, aggressive breach prevention efforts and strong sanctions for violating policies are key to creating a corporate culture that values privacy and security, says Alan Dowling, the new CEO of the American Health Information Management Association.
-
Incident Response Career Trends
05/11/2010Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
-
Incident Response Trends for 2011
03/11/2010Georgia Killcrece: It's how you manage a security incident that counts.