Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.
April 30, 2021Analysis: 'Cybersecurity Call to Arms'The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Fleming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky....more0minPlay
April 29, 2021Protect the Brand: Online Fraud and Cryptocurrency ScamsPhishing, online fraud, cryptocurrency scams – they are coming at lightning speed, threatening enterprises and their brands. And just as fraudsters rely on automation to deliver these attacks, defenders can use automated tools to protect their brands. Jeff Baher of Bolster tells how....more0minPlay
April 28, 2021Case Study: Tackling CIAM Challenges During the PandemicThe federal ban on funding for a national unique patient identifier adds to the complexity of customer identity and access management, especially when dealing with new patients during the COVID-19 pandemic, says Aaron Miri, CIO at UT Health Austin....more0minPlay
April 27, 2021Supreme Court Ruling in Facebook Case: The ImplicationsA recent Supreme Court ruling in a Facebook case offers important lessons to the healthcare sector, says regulatory attorney Paul Hales, who describes the case and its implications....more0minPlay
April 23, 2021Healthcare Risks: Unprotected Databases, 'Shadow IT'Attackers targeting the healthcare sector are frequently exploiting unprotected internet-facing databases and unsecured network devices, including "shadow IT," says David Sygula, a senior analyst at the security firm CybelAngel....more0minPlay
April 23, 2021Analysis: REvil’s $50 Million Extortion EffortThe latest edition of the ISMG Security Report features an analysis of ransomware gang REvil’s threat to release stolen Apple device blueprints unless it receives a massive payoff. Also featured: discussions of the importance of a “shift left” strategy and efforts to secure cryptocurrencies....more0minPlay
April 20, 2021Certificate Lifecycle Management Just Got More Strategic“Work from anywhere” is a game changer, and it has significant impacts on certificate lifecycle management. Patrick Nohe of GlobalSign discusses the new, strategic approach security leaders need to take for CLM....more0minPlay
April 16, 2021Going Beyond HIPAA to Protect Health Data PrivacyA proposed privacy framework from the eHealth Initiative & Foundation and the Center for Democracy and Technology aims to set standards for the collection, disclosure and use of health data that falls outside the protection of HIPAA, says attorney Andrew Crawford of CDT....more0minPlay
April 16, 2021Does FBI Exchange Remediation Action Set a Precedent?The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends....more0minPlay
April 16, 2021A Holistic Approach to Cybersecurity and ComplianceIn a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance....more0minPlay
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.