Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.
January 20, 2020The Role of Satellites in Quantum Key DistributionCould satellites play a role in distributing next-generation encryption keys? Robert Bedington, CTO and co-founder at Singapore-based SpeQtral, describes quantum communications via satellites in this in-depth interview....more0minPlay
January 20, 2020Sizing Up Today's Deception TechnologyDeception technology is evolving as a powerful asset in the cybersecurity arsenal, providing significant advantages in being able to monitor an attacker's behavior, says Joseph Krull, senior analyst at Aite Group....more0minPlay
January 17, 2020The Importance of Setting Patching PrioritiesRecent alerts from federal regulators about patching vulnerabilities in the Windows 10 operating system highlight the importance of strong, ongoing patch management practices for healthcare organizations, says former CISO Mark Johnson....more0minPlay
January 17, 2020Analysis: Huawei 5G DilemmaThe latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology....more0minPlay
January 16, 2020Cloud Security: Overcoming RoadblocksWhile secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration....more0minPlay
January 15, 2020'Wartime' Security Mentality RevisitedFive years ago, cybersecurity executive Dave Merkel called upon enterprises to shed their "peacetime" mindsets and adopt a "wartime" stance against persistent cybercriminals and nation-state actors. How have they risen to that challenge?...more0minPlay
January 14, 2020Critical Steps in Managing Vendor Security RiskIn light of recent ransomware and other cyberattacks against vendors serving numerous healthcare organizations, it's critical to develop and deploy comprehensive vendor risk management programs, says John Farley of Arthur J. Gallagher & Co., a provider of cyber insurance....more0minPlay
January 13, 2020Class Action Breach Lawsuits: The Impact of Data for SaleAfter a data breach, if individuals' stolen information is offered for sale on the dark web, that potentially bolsters class action lawsuits filed by plaintiffs against the breached organization, says technology attorney Steven Teppler of the law firm Mandelbaum Salsburg P.C....more0minPlay
January 10, 2020Reality Check: How Vulnerable Is the Power Grid?Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. power grid? Bernie Cowens, most recently CISO at the nation's largest electric utility, says that's unlikely because the power grid is more cybersecure than you might think....more0minPlay
January 10, 2020Analysis: 'Orwellian' Surveillance in 2020The latest edition of the ISMG Security Report discusses "Orwellian" surveillance activity in 2020 via the ToTok app. Also featured: the controversy over enabling law enforcement to circumvent encryption; the cyberattack risks posed by IoT devices....more0minPlay
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.