Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
The Case for E-Mail Encryption
24/05/2011With so much critical information being exchanged today via e-mail, now is the time to deploy next-generation e-mail encryption solutions, says Bob Janacek, CTO and founder of DataMotion.
-
Privacy: "Mobile Technology Concerns Me"
23/05/2011Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies, has been in privacy management for more than a decade, and he has two main concerns about today's enterprise: Mobile technology and cloud computing.
-
Privacy: "You Can't Prepare Enough"
23/05/2011The recent data breaches at Epsilon and Sony should send a chilling message to privacy officers everywhere. "You can't prepare enough," says Kirk Herath, chief privacy officer of Nationwide Insurance Companies.
-
Chicago HIE's Approach to Security
20/05/2011A new Chicago health information exchange will use a cloud computing architecture with security provisions, says Terri Jacobsen, who's directing the project.
-
Business Continuity: Breaking the Silos
20/05/2011One of the unexpected impacts of the global economic crisis is that many organizations have lost their business resiliency, says Lyndon Bird, director of The Business Continuity Institute, headquartered in the U.K.
-
U.S. Initiates Cybersecurity Diplomacy
20/05/2011Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.
-
How to Refine Privacy, Security Training
18/05/2011Alexander Eremia, chief privacy officer at MedStar Health, says role-based staff training on privacy and security issues is essential.
-
New Threats, New Data Security Strategies
18/05/2011The threat landscape has evolved dramatically over the past several years, and now it's time for healthcare security leaders to step up and meet the new challenges involved with securing critical data.
-
Breach Notification: Be Prepared
16/05/2011Regulatory compliance expert Harry Rhodes says it's essential to have a formal process in place for objectively assessing whether a security incident needs to be reported as a breach.
-
Health Information Exchange Success Strategies
16/05/2011Timathie Leslie and Kristine Martin Anderson of Booz Allen Hamilton share insights on how to ensure the success of health information exchanges.
-
Congressman Sees Obama Plan as a Start
13/05/2011Rep. James Langevin sees some shortcomings in the president's cybersecurity initiatives unveiled Thursday.
-
Device ID & Log Analysis: Complementary Forces
13/05/2011ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.
-
Disaster Recovery: Cross-Training Key
12/05/2011UAB's Terrell Herzig emphasizes training to handle multiple roles.
-
Survey Analysis: Securing the Cloud
12/05/2011U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
-
Disaster Recovery: Cross-Training Key
11/05/2011A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
-
Fight Fraud with Device ID
10/05/2011ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?
-
Cloud Computing for Image Transfers
10/05/2011Cloud computing helps ease the exchange of diagnostic images while maintaining adequate security, says Amy Radonich of University of California San Diego Health System.
-
Social Media: Minimizing Risks
09/05/2011Ethicist Roy Snell warns of a common misperception about social media.
-
Social Media: Minimizing Risks
09/05/2011All employers need to overcome the common misperception that "you can say anything you want on social media and not have any consequences," says compliance specialist Roy Snell.
-
Protecting E-Government Initiatives
09/05/2011Domain name systems are among the least known - but most important - security vulnerabilities for organizations in all sectors. But government agencies in particular need to be concerned about DNS security to protect their e-government initiatives.