Sinopsis
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
The 3 Pillars of Trust
09/03/2011The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust.
-
Breach Notification and National Security
08/03/2011Today's technology is not adequately used, says attorney Lucy Thomson.
-
Patrick Bedwell
05/03/2011Patrick discusses how to consolidate network traffic monitoring into a single appliance and management console, along with web application security and PCI compliance.
-
HealthcareInfoSecurity.com Week in Review for Friday, March 4, 2011
04/03/2011This week's top news and views: Overlooked Breach Prevention Steps; HIPAA Enforcement Picks Up; EHRs and Cloud Computing.
-
EHRs and Cloud Computing
01/03/2011Physicians implementing electronic health records should consider cloud computing as a way to improve security, says healthcare IT consultant Patricia Dodgen.
-
Assessing HIEs on Privacy Issues
01/03/2011Enforcing standards for privacy and security is a major part of a new health information exchange accreditation program, says Lee Barrett, executive director of the Electronic Healthcare Network Accreditation Commission.
-
Overlooked Breach Prevention Steps
28/02/2011Terrell Herzig, information security officer at UAB Medicine, pinpoints frequently overlooked breach prevention steps.
-
HealthcareInfoSecurity.com Month in Review for Feb. 2011
25/02/2011An audio review of some of the most compelling content posted on HealthcareInfoSecurity.com in February.
-
ONC's Fridsma on Security for HIEs
25/02/2011Doug Fridsma, M.D., of the HHS Office of the National Coordinator for Health IT, compares and contrasts the security approaches of two national health information exchange projects.
-
NIST Scientists on Firewalls Circa 2011
22/02/2011Functionality hasn't changed much in two decades, but capabilities have expanded immensely.
-
Mayo Clinic's Insights on Social Media
22/02/2011Lee Aase of Mayo Clinic describes the organization's social media guidelines and offers insights on protecting privacy and security.
-
Tiger Team's Deven McGraw on Next Steps
21/02/2011Deven McGraw, co-chair of the Privacy and Security Tiger Team that's advising federal regulators, offers insights on how the team's recommendations might be implemented and what topics it will tackle next.
-
HealthcareInfoSecurity.com Week in Review for Friday, Feb. 18, 2011
18/02/2011This week's top news and views: New York Breach Affects 1.7 Million; Privacy Protections for Backup Files; Shifting to Hardware-Based Encryption.
-
Cybersecurity: Firewalls Are Easy to Pierce
15/02/2011The 451 Group's Joshua Corman says merely complying with stagnant standards won't ensure security.
-
Shifting to Hardware-Based Encryption
14/02/2011Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
-
Five HIPAA Compliance Tips
11/02/2011Security expert Raj Chaudhary offers five tips for keeping health information private.
-
HealthcareInfoSecurity.com Week in Review for Friday, Feb. 11, 2011
11/02/2011This week's top news and views: Assessing the Privacy and Security Tasks for Blumenthal's Successor at ONC; Sizing Up Consumers' Security Concerns.
-
Sizing Up Consumer Security Concerns
09/02/2011A new consumer survey shows that Americans are more concerned about the security of their financial information and personal identifiers than they are about the security of their medical records.
-
ID Fraud Costs on the Rise
08/02/2011Javelin's Van Dyke says the cost of managing ID fraud is growing exponentially.
-
Lauding the President on Cybersecurity
08/02/2011The Commission on Cybersecurity for the 44th Presidency co-chair praises the president's commitment, but says much more work needs to be done to develop a strategy to combat cyber threats.