PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 68 of 70

Shifting to Hardware-Based Encryption

Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.

Feb 14, 2011

GovInfoSecurity.com<br> Week In Review <br>for Feb. 11, 2011

<b>This week's top news and views: Feds to Require PIV to Access Data and Facilities; President Obama is praised for work on cybersecurity.</b>

Feb 11, 2011

HealthcareInfoSecurity.com Week in Review for Friday, Feb. 11, 2011

This week's top news and views: Assessing the Privacy and Security Tasks for Blumenthal's Successor at ONC; Sizing Up Consumers' Security Concerns.

Feb 11, 2011

Five HIPAA Compliance Tips

Security expert Raj Chaudhary offers five tips for keeping health information private.

Feb 11, 2011

Week In Review: New Accounts Pose Greatest ID Fraud Risk and Cross-Border Payments Heighten Money Laundering Concerns

Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.

Feb 11, 2011

Week In Review: New Accounts Pose Greatest ID Fraud Risk and Cross-Border Payments Heighten Money Laundering Concerns

Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.

Feb 11, 2011

Money Laundering: New Cross-Border Concerns

<b>Accuity CEO Hugh Jones says globalization has opened new doors for money laundering, and international regulators are taking the issue seriously.</b>

Feb 9, 2011

Sizing Up Consumer Security Concerns

A new consumer survey shows that Americans are more concerned about the security of their financial information and personal identifiers than they are about the security of their medical records.

Feb 9, 2011

ID Fraud Costs on the Rise

<b>Javelin's Van Dyke says the cost of managing ID fraud is growing exponentially.</b>

Feb 8, 2011

Lauding the President on Cybersecurity

<b>The Commission on Cybersecurity for the 44th Presidency co-chair praises the president's commitment, but says much more work needs to be done to develop a strategy to combat cyber threats.</b>

Feb 8, 2011

"Allow by Default, Deny by Exception"

Dennis Devlin of Brandeis University knows the difference between training and education.

Feb 7, 2011

GovInfoSecurity.com <br>Week In Review <br>for Feb. 4, 2011

<b>This week's top news and views: NIST issues new guidance on securing public cloud; Senators say no Internet kill switch in their bill; Commission on Cybersecurity for the 44th Presidency sees slow progress; and ex-federal CIO and mom Karen Evans on computer security and kids.</b>

Feb 4, 2011

HealthcareInfoSecurity.com Week in Review for Friday, Feb. 4, 2011

This week's top news and views: ONC's Blumenthal to Step Down; Reflections on Health Info Security; 73-Hospital System Sets Security Goals.

Feb 4, 2011

BankInfoSecurity.com Week In Review for February 4, 2011

One community bank shares its side of the corporate account takeover story, and a new survey finds that security compliance reduces long-term expenses.

Feb 4, 2011

CUInfoSecurity.com Week in Review for Feb. 4, 2011

One community bank shares its side of the corporate account takeover story, and a new survey finds that security compliance reduces long-term expenses.

Feb 4, 2011

Breach Disclosure: New Laws, Higher Standard

<b>Wells Fargo's Alexander says breach disclosure laws are getting tougher.</b>

Feb 3, 2011

The Merits of Cyberweaponry

<b>"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.</b>

Feb 1, 2011

Is ACH Fraud Over-Hyped?

<b>NACHA's CEO says ACH-related fraud is often over-hyped, and occurs far less often than check- and payment card-related fraud. But when corporate accounts are breached, fraudulent ACH transactions lead to big financial losses.</b>

Feb 1, 2011

73-Hospital System Sets Security Goals

Sheryl Rose, the first chief information security officer at Catholic Health Initiatives, is leading efforts to implement a comprehensive security strategy as the organization rolls out electronic health records.

Feb 1, 2011

The ROI of Security Compliance

<b>Tripwire's Shenoy says security compliance improves the bottom-line.</b>

Jan 31, 2011

GovInfoSecurity.com <br>Editor's Choice <br>for January 2011

January's top news and views: top 10 government IT security influencers for 2011, state battles data leakage, giving non-IT managers ownership of IT risk and surveying government IT security practitioners.

Jan 28, 2011

BankInfoSecurity.com Editor's Choice for Jan. 2011

The Federal Financial Institutions Examination Council is expected to issue new security guidance revisiting online banking and strong authentication, and a new report from Aite finds internal fraud at most institutions is underreported.

Jan 28, 2011

HealthcareInfoSecurity.com Editor's Choice: Jan. 2011

An audio review of some of the most compelling content posted on HealthcareInfoSecurity.com in January 2011.

Jan 28, 2011

Cyber Attacks: Lopsided Warfare

<b>Terry Austin says banks and credit unions have the tools and the know-how to be the heroes, when it comes to ACH fraud prevention.</b>

Jan 28, 2011

CUInfoSecurity.com Editor's Choice for Jan. 2011

The Federal Financial Institutions Examination Council is expected to issue new security guidance revisiting online banking and strong authentication, and a new report from Aite finds internal fraud at most institutions is underreported.

Jan 28, 2011

Is Fraud Prevention Misguided?

<b>Dave Jevans says most U.S. banks are ill-equipped to fight 2011's newest security threats, such as automated malware attacks.</b>

Jan 27, 2011

Selecting a Data Loss Prevention App

Security specialist Rebecca Herold says data loss prevention software can play a critical role in preventing information breaches.

Jan 27, 2011

Beware of Social Media for Screening

<b>Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.</b>

Jan 25, 2011

Connecting the Mobile Channel

Investments in mobile offers and channel integration will not be mutually exclusive in 2011, says Jim Pitts. Mobile will actually bring more channels together.

Jan 24, 2011

GovInfoSecurity.com<br>Week In Review<br>for Friday, Jan. 21, 2011

This week's top news and views: Parsing the definition of cyberwar, taking the pulse of government IT security and addressing ways to deploy secure cloud computing services.

Jan 21, 2011

BankInfoSecurity.com Week in Review for Friday, Jan. 21, 2011

The FFIEC is expected to issue new security guidance that revisits online banking and strong authentication, and IronKey's Dave Jevans says the industry should fight online fraud, rather than focusing narrowly on ACH.

Jan 21, 2011

CUInfoSecurity.com Week in Review for Friday, Jan. 21, 2011

This week's top news and views: The FFIEC is expected to issue new security guidance that revisits online banking and strong authentication, and IronKey's Dave Jevans says the industry should fight online fraud, rather than focusing narrowly on ACH.

Jan 21, 2011

Cyber Terrorism: How to Fight Back

<b>Cyber terrorism can happen to you, and probably will, says G.F. Bryant Jr. of the World Institute for Security Enhancement.</b>

Jan 21, 2011

HealthcareInfoSecurity.com Week in Review for Friday, Jan. 21, 2011

This week's top news and views: Accenture to Study EHR Interoperability; Clinics Have a Long Way to Go on Security; HITECH As a Security Reminder.

Jan 21, 2011

The 'Human Side' of EHR Security

Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.

Jan 21, 2011

The Mobile Chip and EMV

<b>Philip Andreae is optimistic the U.S. will adhere to a global standard, but the method could vary from the norm.</b>

Jan 20, 2011

Fraud: How Banks Are Fighting Back

From <a href='https://www.bankinfosecurity.com/debit-credit-prepaid-cards-c-161'><b>payment cards</b></a> to <a href='https://www.bankinfosecurity.com/check-fraud-c-246'><b>checks</b></a>, <a href='https://www.bankinfosecurity.com/ach-fraud-c-244'><b>ACH transactions</b></a> to <a href='https://www.bankinfosecurity.com/phishing-c-32'><b>phishing</b></a>, there's no question that fraudsters have waged war on banks. And now the institutions are fighting back.

Jan 20, 2011

HITECH: Security Reminder for Clinics

Clinics applying for HITECH Act electronic health records incentive payments are getting a reminder about the importance of information security, says Robert Tennant of the Medical Group Management Association

Jan 19, 2011

Online Fraud: Heart of the Problem

<b>IronKey's Dave Jevans says the industry should fight online fraud, rather than focusing narrowly on ACH.</b>

Jan 19, 2011

National Breach Warning System Urged

<b>When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.</b>

Jan 17, 2011

Cryptography in the Cloud

<b>Ralph Spencer Poore: There's no better way to secure critical data than through cryptography, especially when that data is stored in the cloud.</b>

Jan 14, 2011

HealthcareInfoSecurity.com Week in Review for Friday, Jan. 14, 2011

This week's top news: An in-depth analysis of a presidential council's report that calls for a universal exchange language for electronic health records.

Jan 14, 2011

GovInfoSecurity.com <br>Week In Review <br>for Friday, Jan. 14, 2011

This week's top news and views: IT employment ends 2010 near a two-year high; IT security jobs are on the rise in 2011; and giving non-IT executives the responsibility for IT risk.

Jan 14, 2011

CUInfoSecurity.com Week in Review for Friday, Jan. 14, 2011

Mobile and online P2P services offer banks and credit unions a competitive edge, and a new Aite report proves internal fraud is more damaging than most banks realize.

Jan 14, 2011

BankInfoSecurity.com Week In Review for Jan. 14, 2011

This week's top news and views: Mobile and online P2P services offer banks and credit unions a competitive edge, and a new Aite report proves internal fraud is more damaging than most banks realize.

Jan 14, 2011

Cloud Computing: Finding the Right Solution

The cost savings can be significant, but cloud computing also promises to help healthcare organizations manage risks and achieve business continuity goals.

Jan 13, 2011

PCI Compliance: Improvements Needed

<b>Most industries say PCI is improving payment card security, but driving consumer and employee awareness about vulnerabilities remains a challenge.</b>

Jan 12, 2011

The History of EMV

Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.

Jan 11, 2011

Giving Non-IT Execs Onus for IT Risk

Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.

Jan 11, 2011

Critiquing EHR Interoperability Plan

A recently released presidential council report, while raising important issues, oversimplifies the challenges involved in securely exchanging health information, says Joyce Sensmeier, vice president for informatics at the Healthcare Information and Management Systems Society.

Jan 10, 2011