Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.
July 12, 2019Battling Supply Chain Security RisksIncidents involving supply chain vendors pose increasingly significant risks to health data, says Rick McElroy of Carbon Black, who addresses "island hopping" and other emerging threats....more0minPlay
July 12, 2019Analysis: The Significance of GDPR FinesThe latest edition of the ISMG Security Report analyzes the significance of fines against British Airways and Marriott for violations of the EU's GDPR. Also featured are discussions of California's privacy law as a model for other states and the next generation of deception technologies....more0minPlay
July 12, 2019The Future SOC: Harmonizing Detection and ResponseThe success of security operations centers will depend on how well they blend key technologies - including detection, user behavior analytics and orchestration, says Haiyan Song of Splunk, who offers strategic insights....more0minPlay
July 11, 2019Legal Implications of the AMCA Data BreachThe relationship between American Medical Collection Agency and its laboratory clients affected by the company's data breach will be closely examined as breach-related lawsuits progress, says attorney Paul Hales, a HIPAA specialist, who explains why....more0minPlay
July 10, 2019Put Those Cloud Security Objections to RestIn the wake of digital transformation, there remain some organizations that - for security reasons - resist the temptation to move to the cloud. What are their objections? Zscaler's Bil Harmer addresses these, as well as the critical questions security leaders should ask of cloud service providers....more0minPlay
July 09, 2019Threat Intelligence: Why Sharing Is DifficultCyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an automated way, says Shawn Henry of CrowdStrike Services. But that sharing has been hampered by a lack of understanding of why it's important and how organizations can benefit, he says....more0minPlay
July 08, 2019Why Application Security Is Your Best Cyber DefenseWith attackers continuing to hammer weaknesses in software, organizations must prioritize application security more than ever, says Ian Ashworth of Synopsys. Thankfully, developers and middle management - bolstered by agile methodologies and DevOps - are increasingly leading the charge....more0minPlay
July 05, 2019Life Beyond Passwords: The Rise of Advanced BiometricsBiometrics may be in fashion, but it's in part because users are ready, willing and able to use it to prove their identity, thanks to Apple, Samsung, Google and other players providing trustable hardware for verifying people's fingerprints and faces, says IBM Security's Neil Warburton....more0minPlay
July 05, 2019Analysis: Strong vs. Weak EncryptionThe latest edition of the ISMG Security Report analyzes the debate over whether the government should require technology firms to use weak encryption for messaging applications. Plus, D-Link's proposed settlement with the FTC and a CISO's update on medical device security....more0minPlay
July 02, 2019The New Threat IntelligenceThreat intelligence programs have evolved greatly over the past decade. But Mario Vuksan, CEO of ReversingLabs, says too many organizations are overlooking the value of local intelligence embedded in their own networks. Vuksan talks about maximizing TI resources....more0minPlay
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.