Sinopsis
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
The Social Media Challenge
06/01/2011To Brian Lapidus, COO of Kroll's Fraud Solutions group, the main threat to data security can be summed up in two words: social networking.
-
A New Authentication Strategy
05/01/2011Geisinger Health System is changing its approach to user authentication for its various portals, says Dave Young, IT director of web services.
-
R&D Focuses on Finding Data in Cloud
03/01/2011Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
-
Futurist Questions HITECH's Viability
31/12/2010Healthcare futurist Jeff Bauer explains why he believes the federal electronic health record incentive program has a slim chance of success.
-
Editor's Choice: 2011 Health Info Security Forecasts
30/12/2010An audio review of 2011 forecasts posted on HealthcareInfoSecurity.com in December.
-
Cloud Computing: A Good Fit?
30/12/2010More storage capacity, less cost - this is the promise of cloud computing for healthcare organizations.
-
HIPAA Enforcement: A 2011 Priority?
29/12/2010Attorney Kathy Roe of The Health Law Consultancy sizes up the healthcare information privacy and security regulatory outlook for 2011.
-
8 IT Security Threats for 2011
28/12/2010Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
-
The Age of 'Involuntary Transparency'
27/12/2010"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
-
4 Components of the Insider Threat
22/12/2010Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.
-
Global Security Challenges for 2011
22/12/20102011 will be the year of more -- more sophisticated malware, more WikiLeaks-style breaches and more regulatory compliance headaches.
-
Firestorm of Privacy Activity
20/12/2010"Literally, in my entire time working in the privacy field, I've never seen such profound and aggressive activity by the government in the privacy space," privacy expert Thomas Oscherwitz says.
-
Security Spending Up at Rural Hospital
20/12/2010Ron Kloewer, CIO at 25-bed Montgomery County Memorial Hospital, explains why the critical access facility's spending on information security will grow in 2011.
-
HealthcareInfoSecurity.com Week in Review for Friday, Dec. 17, 2010
17/12/2010This week's top news and views: Revised NHIN Governance Plan Advances; Sizing Up the Role of XML in EHRs; Top Healthcare Security Trends for 2011. And don't miss our audio week-in-review podcast by Howard Anderson, managing editor.
-
Social Media Policies a 2011 Priority
17/12/2010Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
-
Breach Prevention: Bulletproofing Healthcare Network Security
15/12/2010With a hodgepodge of networks, applications and operating systems to manage - maintaining security and preventing breaches can be difficult. The challenges are daunting, but solutions are at hand. This is the perspective of Roark Pollock of HP Tippingpoint. In an interview, Pollock discusses three specific challenges: Regulatory compliance; Patch management; Virtualized environments.
-
Secure Messaging, Remote Access Vital
15/12/2010Expanding use of secure messaging as well as remote access to information systems are key 2011 IT priorities for Shriners Hospitals for Children, says Bill Bria, M.D., chief medical information officer.
-
Managing Risk: Why It's a Hot Topic
14/12/2010NIST's Ron Ross Tackles the Risk Management Framework
-
Marcus Ranum on 2011 Security Outlook
14/12/2010If Marcus Ranum were your CISO, this would be his 2011 resolution: To launch a "War Games" style exercise.
-
WikiLeaks Backlash: 'We Are Going to Take You Down'
10/12/2010Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."