Sinopsis
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Who Decides How to Allot Infosec Funds?
30/03/2012As enterprises spend frugally on IT security, cybercriminals aren't, and that presents big problems for organizations working feverishly to secure their digital assets, says Steve Durbin, global vice president of the Information Security Forum.
-
Mobile Device Management Tips
29/03/2012Mobile device management systems are relatively immature, so shoppers need to ask probing questions about the systems' functionality, advises security consultant J. David Kirby.
-
Tips for Picking a Data Security Center Site
28/03/2012Where's the best place to build a large healthcare data security center? A new study suggests Sioux Falls, S.D.
-
Designing Privacy into Online Products
27/03/2012Organizations and leaders seeking to assure the privacy of their customers should implement privacy by design in the development process, privacy lawyer Alan Friel says.
-
Omnibus HIPAA Package Progresses
27/03/2012An omnibus package of regulations that includes a final version of extensive HIPAA modifications, which have been pending since 2010, as well as a final version of the HIPAA breach notification rule has moved one major step closer to completion.
-
The Cost of a Data Breach
23/03/2012The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
-
Verizon: Hacktivists #1 Breach Threat
22/03/2012Verizon's 2012 Data Breach Investigations Report shows dramatic increases in attacks linked to hacktivist groups like Anonymous and LulzSec. How should organizations respond to this evolving threat?
-
HIEs: Protecting Civil Liberties
21/03/2012Health information exchanges should obtain patient permission before they take any steps toward making medical records available for potential exchange, according to a new report from the New York Civil Liberties Union.
-
Redefining IT Security's Core Tenets
16/03/2012Protecting the availability, confidentiality and integrity of information are the core tenets of IT security. But an FBI cybersecurity leader, Steve Chabinsky, suggests the central theme of IT security needs to be broadened to include assurance and attribution.
-
Avoiding Pitfalls of the Cloud Contract
15/03/2012Cloud-computing service provider contracts, for most businesses and government customers, are take-it-or-leave it propositions, so organizations must approach a services agreement cautiously, IT security lawyer Françoise Gilbert says.
-
Why Data Storage Is a Key HITECH Issue
12/03/2012One important way to prepare for Stage 2 of the HITECH Act electronic health record incentive program is to take steps toward eliminating storage of patient records on mobile devices, says privacy expert Deborah Gascard Wolf.
-
How New iPad Can Be Blast from the Past
12/03/2012Apple's introduction of its third iteration of the iPad e-tablet, coupled with the growing popularity of cloud computing, could lead to new methods of enterprise computing and IT security, Delaware Chief Security Officer Elayne Starkey says.
-
iPad3 4G Nudges BYOD
09/03/2012Apple's release of the new iPad will affect business. How should organizations incorporate new mobile concerns into their BYOD policies? Joe Rogalski of New York's First Niagara Bank weighs in.
-
Sizing Up the HITECH Stage 2 Rules
08/03/2012Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
-
Rallying Support for Security Investments
07/03/2012Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report.
-
Dissecting a Hacktivist Attack
06/03/2012Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
-
Deferring to Business on Cybersecurity
05/03/2012Commerce Undersecretary for Standards and Technology Patrick Gallagher sees the private sector, not government, taking the lead to develop tools, processes and standards to help safeguard IT systems and data in and out of government.
-
Breaches: The Top Trends
02/03/2012What are the top global breach trends and threats that organizations should be watching? Wade Baker of Verizon offers insights gleaned from a new study of his group's latest investigations.
-
Schmidt Hopeful on Bill's Passage
01/03/2012White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.
-
A Framework for Vulnerability Reports
29/02/2012A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities.