
Info Risk Today Podcast
3,490 episodes — Page 67 of 70
Multifactor Authentication Needs Focus
Current solutions are good at authenticating users, but not the integrity of the transactions, says Rik Ferguson of Trend Micro. "We're not authenticating the right things."
Dr. HIPAA: Security Funding Essential
Adequate funding for privacy and security measures is essential to the success of sharing electronic health records to improve the quality of care, says William Braithwaite, M.D., Ph.D.
Australia: Cyber Crime Fight
Australia's government agencies can learn a lot from the nation's banks, when it comes to risk management and protecting privacy, says Graham Ingram, General Manager of the Australian Computer Emergency Response Team. "There are too many people in government organisations who are in denial [of risks]," he says.
Fighting Cross-Channel Fraud
Zayd Sukhun says global political unrest has upped regulators' expectations for banks to streamline fraud-detection tools and techniques.
Preparing For HIPAA Audits
Privacy and security specialist Phyllis Patrick offers practical tips on preparing for the upcoming federal HIPAA compliance audits.
OCR's McAndrew on Enforcing HIPAA
Susan McAndrew of the HHS Office for Civil Rights discusses recent high-profile HIPAA cases, upcoming state attorneys general training and the pending HIPAA audit program.
How Gov't Will Fix WikiLeaks Problem
This week's report focuses on one story: Senate WikiLeaks hearing, in which administration officials explained how the WikiLeaks episode occurred and what's being done to prevent such a breach from occurring again.
Patient Control of EHR Access
Joy Pritts of the Office of the National Coordinator for Health IT says the office intends to develop standards that would give patients the ability to exclude clinicians from accessing certain portions of their electronic health records.
Japan Disaster: Business Continuity
In the initial wake of Japan's devastating earthquake and subsequent tsunami, business continuity plans have been tested, and organizations now are dealing with severe aftershocks and a growing national crisis, says Alan Berman, executive director of DRI International.
Global Payments: Fraud and the Future
<b>SWIFT's Gottfried Leibbrandt says conflicting regulatory mandates could further fragment the international payments market.</b>
BankInfoSecurity Week In Review for Friday, March 11, 2011
Pay-at-the-pump card skimming is back, just in time for spring break; and Editorial Director Tom Field shares thoughts from Phoenix about BAI's recent Payments Connect conference.
CUInfoSecurity Week In Review for Friday, March 11, 2011
Pay-at-the-pump card skimming is back, just in time for spring break; and Editorial Director Tom Field shares thoughts from Phoenix about BAI's recent Payments Connect conference.
DNS: The Most Overlooked Aspect of Healthcare Security
Domain Name Security - it's one of the most neglected aspects of information security, but critical to healthcare organizations.
HealthcareInfoSecurity.com Week in Review for Friday, March 11, 2011
This week's top news and views: State AGs to Get HIPAA Lawsuit Training; Eight Breach Prevention Tips; Evolving Uses for Smart Cards.
State Infosec Unit Shifts Focus to Risk
<b>Iowa CISO Jeff Franklin explains how collecting real-time information helps the state information security office transition its focus from technology to risk management.</b>
ATM Security: 3 Key Vulnerabilities
Skimming remains the top threat to ATMs worldwide, but certain regions in Europe and Latin America are also seeing a rise in logical security breaches. Bottom line: ATMs are under attack.
Evolving Uses for Smart Cards
Russ Jones of Albert Einstein Healthcare Network describes why the delivery system shifted from magnetic stripe cards to smart cards for a variety of applications.
The 3 Pillars of Trust
The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust.
Breach Notification and National Security
<b>Today's technology is not adequately used, says attorney Lucy Thomson.</b>
3 Infosec Challenges States Face
For former New York State CISO Will Pelgrin, mobile devices, insiders and old infrastructure represent the major challenges local and state governments face in 2011 in securing information technology.
Roadmap to EMV
<b>The Smart Card Alliance's Vanderhoof says U.S. card issuers will likely rely on contactless mag-stripe technology to bridge a payments migration to EMV.</b>
Will Pelgrin: The CISO-Plus
<b>The CISO's CISO still sways government infosec from the outside</b>
Patrick Bedwell
Patrick discusses how to consolidate network traffic monitoring into a single appliance and management console, along with web application security and PCI compliance.
GovInfoSecurity.com <br>Week In Review <br>for Friday, March 4, 2011
<b>This week's top news and views: New NIST guidance focuses on risk management; DHS seeks hundreds of millions of dollars for cybersecurity projects; and former New York State CISO Will Pelgrin on federal-state-local IT collaboration.</b>
BankInfoSecurity.com Week In Review for Friday, March 4, 2011
AML concerns heat up, as FinCEN warns U.S. institutions to scrutinize accounts held by foreign political figures. And the unofficial release of an FFIEC draft about online authentication guidance opens regulators to more feedback and criticism.
CUIS Week in Review for Friday, March 4, 2011
AML concerns heat up, as FinCEN warns U.S. institutions to scrutinize accounts held by foreign political figures. And the unofficial release of an FFIEC draft about online authentication guidance opens regulators to more feedback and criticism.
HealthcareInfoSecurity.com Week in Review for Friday, March 4, 2011
<b> This week's top news and views: Overlooked Breach Prevention Steps; HIPAA Enforcement Picks Up; EHRs and Cloud Computing.</b>
Great Expectations: Global Security Challenge
<b>Mobile banking, social media, cloud computing. These all are part of the global banking landscape today, and with these innovations come new expectations, says Alessandro Moretti of (ISC)2 and UBS Investment Bank.</b>
Assessing HIEs on Privacy Issues
Enforcing standards for privacy and security is a major part of a new health information exchange accreditation program, says Lee Barrett, executive director of the Electronic Healthcare Network Accreditation Commission.
EHRs and Cloud Computing
Physicians implementing electronic health records should consider cloud computing as a way to improve security, says healthcare IT consultant Patricia Dodgen.
Overlooked Breach Prevention Steps
Terrell Herzig, information security officer at UAB Medicine, pinpoints frequently overlooked breach prevention steps.
BankInfoSecurity.com Month in Review for Feb. 2011
A preliminary draft of new authentication guidance puts greater responsibility on financial institutions, and the ACH/wire fraud case between Experi-Metal Inc. and Comerica Bank marks the first major corporate account takeover incident to hit a courtroom.
CUInfoSecurity.com Month in Review for Feb. 2011
A preliminary draft of new authentication guidance puts greater responsibility on financial institutions, and the ACH/wire fraud case between Experi-Metal Inc. and Comerica Bank marks the first major corporate account takeover incident to hit a courtroom.
GovInfoSecurity.com<br> Month in Review <br>for February 2011
<b>Government IT security practitioners address the cloud challenge.</b>
HealthcareInfoSecurity.com Month in Review for Feb. 2011
An audio review of some of the most compelling content posted on HealthcareInfoSecurity.com in February.
ONC's Fridsma on Security for HIEs
Doug Fridsma, M.D., of the HHS Office of the National Coordinator for Health IT, compares and contrasts the security approaches of two national health information exchange projects.
Diversity of Devices, Not the Number of Them, Presents Infosec Challenges
<b>Cisco's Don Proctor longs for days of Microsoft patches.</b>
U.S. Mag Stripe Fuels ATM Skimming
<b>ADT's John Pearce says continued use of the magnetic-stripe is to blame for growing card-skimming trends and threats in the U.S.</b>
NIST Scientists on Firewalls Circa 2011
<b>Functionality hasn't changed much in two decades, but capabilities have expanded immensely.</b>
Mayo Clinic's Insights on Social Media
Lee Aase of Mayo Clinic describes the organization's social media guidelines and offers insights on protecting privacy and security.
Preventing Online Fraud
<b>Tom Oscherwitz says consumers put themselves at risk by giving out too much personal information that is often used for online banking log-in credentials.</b>
Tiger Team's Deven McGraw on Next Steps
Deven McGraw, co-chair of the Privacy and Security Tiger Team that's advising federal regulators, offers insights on how the team's recommendations might be implemented and what topics it will tackle next.
CUInfoSecurity.com's Week in Review for Feb. 18, 2011
Visa says a move toward EMV can help merchants cut PCI compliance costs, and SWIFT says globalization, regulation and the introduction of new services from non-financial providers will set the tone for payments 2011.
HealthcareInfoSecurity.com Week in Review for Friday, Feb. 18, 2011
This week's top news and views: New York Breach Affects 1.7 Million; Privacy Protections for Backup Files; Shifting to Hardware-Based Encryption.
GovInfoSecurity.com <br>Week In Review <br>for Feb. 18, 2011
This week's top news and views: Government infosec pros question the federal government's security resolve, according to our new survey; Steve Jobs is Apple of Pentagon's eye; and a Department of Cyber -- a fleeting idea?
BankInfoSecurity.com's Week in Review for Feb. 18, 2011
Visa says a move toward EMV can help merchants cut PCI compliance costs, and SWIFT says globalization, regulation and the introduction of new services from non-financial providers will set the tone for payments 2011.
Dynamic Authentication and Card Security
<p>Visa's Eduardo Perez, head of Global Payment System Security, says the EMV chip is an ideal dynamic data technology, but mobile and others offer similar security benefits.</p>
Globalization Will Impact Regulation
<b>SWIFT's Stacy Rosenthal says globalization, regulation and the introduction of new services from non-financial providers will set the tone for 2011.</b>
Cybersecurity: Firewalls Are Easy to Pierce
<b>The 451 Group's Joshua Corman says merely complying with stagnant standards won't ensure security.</b>
Placing in Context Infosec Skills Gap
Attracting and retaining IT security professionals may be the No. 1 staffing challenge states face, but the numbers alone unveiled in a recent National Association of State Chief Information Officers survey don't tell the whole story.