
Info Risk Today Podcast
3,490 episodes — Page 68 of 70
Shifting to Hardware-Based Encryption
Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
GovInfoSecurity.com<br> Week In Review <br>for Feb. 11, 2011
<b>This week's top news and views: Feds to Require PIV to Access Data and Facilities; President Obama is praised for work on cybersecurity.</b>
HealthcareInfoSecurity.com Week in Review for Friday, Feb. 11, 2011
This week's top news and views: Assessing the Privacy and Security Tasks for Blumenthal's Successor at ONC; Sizing Up Consumers' Security Concerns.
Five HIPAA Compliance Tips
Security expert Raj Chaudhary offers five tips for keeping health information private.
Week In Review: New Accounts Pose Greatest ID Fraud Risk and Cross-Border Payments Heighten Money Laundering Concerns
Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
Week In Review: New Accounts Pose Greatest ID Fraud Risk and Cross-Border Payments Heighten Money Laundering Concerns
Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
Money Laundering: New Cross-Border Concerns
<b>Accuity CEO Hugh Jones says globalization has opened new doors for money laundering, and international regulators are taking the issue seriously.</b>
Sizing Up Consumer Security Concerns
A new consumer survey shows that Americans are more concerned about the security of their financial information and personal identifiers than they are about the security of their medical records.
ID Fraud Costs on the Rise
<b>Javelin's Van Dyke says the cost of managing ID fraud is growing exponentially.</b>
Lauding the President on Cybersecurity
<b>The Commission on Cybersecurity for the 44th Presidency co-chair praises the president's commitment, but says much more work needs to be done to develop a strategy to combat cyber threats.</b>
"Allow by Default, Deny by Exception"
Dennis Devlin of Brandeis University knows the difference between training and education.
GovInfoSecurity.com <br>Week In Review <br>for Feb. 4, 2011
<b>This week's top news and views: NIST issues new guidance on securing public cloud; Senators say no Internet kill switch in their bill; Commission on Cybersecurity for the 44th Presidency sees slow progress; and ex-federal CIO and mom Karen Evans on computer security and kids.</b>
HealthcareInfoSecurity.com Week in Review for Friday, Feb. 4, 2011
This week's top news and views: ONC's Blumenthal to Step Down; Reflections on Health Info Security; 73-Hospital System Sets Security Goals.
BankInfoSecurity.com Week In Review for February 4, 2011
One community bank shares its side of the corporate account takeover story, and a new survey finds that security compliance reduces long-term expenses.
CUInfoSecurity.com Week in Review for Feb. 4, 2011
One community bank shares its side of the corporate account takeover story, and a new survey finds that security compliance reduces long-term expenses.
Breach Disclosure: New Laws, Higher Standard
<b>Wells Fargo's Alexander says breach disclosure laws are getting tougher.</b>
The Merits of Cyberweaponry
<b>"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.</b>
Is ACH Fraud Over-Hyped?
<b>NACHA's CEO says ACH-related fraud is often over-hyped, and occurs far less often than check- and payment card-related fraud. But when corporate accounts are breached, fraudulent ACH transactions lead to big financial losses.</b>
73-Hospital System Sets Security Goals
Sheryl Rose, the first chief information security officer at Catholic Health Initiatives, is leading efforts to implement a comprehensive security strategy as the organization rolls out electronic health records.
The ROI of Security Compliance
<b>Tripwire's Shenoy says security compliance improves the bottom-line.</b>
GovInfoSecurity.com <br>Editor's Choice <br>for January 2011
January's top news and views: top 10 government IT security influencers for 2011, state battles data leakage, giving non-IT managers ownership of IT risk and surveying government IT security practitioners.
BankInfoSecurity.com Editor's Choice for Jan. 2011
The Federal Financial Institutions Examination Council is expected to issue new security guidance revisiting online banking and strong authentication, and a new report from Aite finds internal fraud at most institutions is underreported.
HealthcareInfoSecurity.com Editor's Choice: Jan. 2011
An audio review of some of the most compelling content posted on HealthcareInfoSecurity.com in January 2011.
Cyber Attacks: Lopsided Warfare
<b>Terry Austin says banks and credit unions have the tools and the know-how to be the heroes, when it comes to ACH fraud prevention.</b>
CUInfoSecurity.com Editor's Choice for Jan. 2011
The Federal Financial Institutions Examination Council is expected to issue new security guidance revisiting online banking and strong authentication, and a new report from Aite finds internal fraud at most institutions is underreported.
Is Fraud Prevention Misguided?
<b>Dave Jevans says most U.S. banks are ill-equipped to fight 2011's newest security threats, such as automated malware attacks.</b>
Selecting a Data Loss Prevention App
Security specialist Rebecca Herold says data loss prevention software can play a critical role in preventing information breaches.
Beware of Social Media for Screening
<b>Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.</b>
Connecting the Mobile Channel
Investments in mobile offers and channel integration will not be mutually exclusive in 2011, says Jim Pitts. Mobile will actually bring more channels together.
GovInfoSecurity.com<br>Week In Review<br>for Friday, Jan. 21, 2011
This week's top news and views: Parsing the definition of cyberwar, taking the pulse of government IT security and addressing ways to deploy secure cloud computing services.
BankInfoSecurity.com Week in Review for Friday, Jan. 21, 2011
The FFIEC is expected to issue new security guidance that revisits online banking and strong authentication, and IronKey's Dave Jevans says the industry should fight online fraud, rather than focusing narrowly on ACH.
CUInfoSecurity.com Week in Review for Friday, Jan. 21, 2011
This week's top news and views: The FFIEC is expected to issue new security guidance that revisits online banking and strong authentication, and IronKey's Dave Jevans says the industry should fight online fraud, rather than focusing narrowly on ACH.
Cyber Terrorism: How to Fight Back
<b>Cyber terrorism can happen to you, and probably will, says G.F. Bryant Jr. of the World Institute for Security Enhancement.</b>
HealthcareInfoSecurity.com Week in Review for Friday, Jan. 21, 2011
This week's top news and views: Accenture to Study EHR Interoperability; Clinics Have a Long Way to Go on Security; HITECH As a Security Reminder.
The 'Human Side' of EHR Security
Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.
The Mobile Chip and EMV
<b>Philip Andreae is optimistic the U.S. will adhere to a global standard, but the method could vary from the norm.</b>
Fraud: How Banks Are Fighting Back
From <a href='https://www.bankinfosecurity.com/debit-credit-prepaid-cards-c-161'><b>payment cards</b></a> to <a href='https://www.bankinfosecurity.com/check-fraud-c-246'><b>checks</b></a>, <a href='https://www.bankinfosecurity.com/ach-fraud-c-244'><b>ACH transactions</b></a> to <a href='https://www.bankinfosecurity.com/phishing-c-32'><b>phishing</b></a>, there's no question that fraudsters have waged war on banks. And now the institutions are fighting back.
HITECH: Security Reminder for Clinics
Clinics applying for HITECH Act electronic health records incentive payments are getting a reminder about the importance of information security, says Robert Tennant of the Medical Group Management Association
Online Fraud: Heart of the Problem
<b>IronKey's Dave Jevans says the industry should fight online fraud, rather than focusing narrowly on ACH.</b>
National Breach Warning System Urged
<b>When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.</b>
Cryptography in the Cloud
<b>Ralph Spencer Poore: There's no better way to secure critical data than through cryptography, especially when that data is stored in the cloud.</b>
HealthcareInfoSecurity.com Week in Review for Friday, Jan. 14, 2011
This week's top news: An in-depth analysis of a presidential council's report that calls for a universal exchange language for electronic health records.
GovInfoSecurity.com <br>Week In Review <br>for Friday, Jan. 14, 2011
This week's top news and views: IT employment ends 2010 near a two-year high; IT security jobs are on the rise in 2011; and giving non-IT executives the responsibility for IT risk.
CUInfoSecurity.com Week in Review for Friday, Jan. 14, 2011
Mobile and online P2P services offer banks and credit unions a competitive edge, and a new Aite report proves internal fraud is more damaging than most banks realize.
BankInfoSecurity.com Week In Review for Jan. 14, 2011
This week's top news and views: Mobile and online P2P services offer banks and credit unions a competitive edge, and a new Aite report proves internal fraud is more damaging than most banks realize.
Cloud Computing: Finding the Right Solution
The cost savings can be significant, but cloud computing also promises to help healthcare organizations manage risks and achieve business continuity goals.
PCI Compliance: Improvements Needed
<b>Most industries say PCI is improving payment card security, but driving consumer and employee awareness about vulnerabilities remains a challenge.</b>
The History of EMV
Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.
Giving Non-IT Execs Onus for IT Risk
Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
Critiquing EHR Interoperability Plan
A recently released presidential council report, while raising important issues, oversimplifies the challenges involved in securely exchanging health information, says Joyce Sensmeier, vice president for informatics at the Healthcare Information and Management Systems Society.