Security Insider - Podcast Edition

Follow Security Insider - Podcast Edition
Share on
Copy link to clipboard

Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.

Townsend Security

  • Apr 13, 2020 LATEST EPISODE
  • infrequent NEW EPISODES
  • 18m AVG DURATION
  • 85 EPISODES


Search for episodes from Security Insider - Podcast Edition with a specific topic:

Latest episodes from Security Insider - Podcast Edition

State of Encryption Key Management - 2020

Play Episode Listen Later Apr 13, 2020 25:17


By many, encryption is considered the hardest part of data security, and key management the hardest part of encryption. As such, it is far too common to see businesses not properly storing their encryption keys - for example, keeping them in a database in the clear or even burned into their application’s code. This podcast discusses the latest trends and perspectives around encryption key management and how to better protect your data. Download this podcast to learn about: The current state of encryption key management Databases/applications that natively support encryption key management Meeting evolving compliance requirements

Don’t Forget FIPS and Other Fundamental Key Management Features

Play Episode Listen Later Jan 21, 2019 22:48


Over the last several years, encryption key management has attained “essential infrastructure” status. When done properly, key management can protect encrypted data - and in the event of a data breach, can even provide a company with an exemption for a breach notification. Download this podcast to learn about: What enterprises should look for in an encryption key manager The importance of standards (FIPS 140-2, PCI DSS validation, etc.) Meeting data security compliance (PCI DSS, GDPR, HIPAA, etc.) requirements with encryption key management KMS (Key Management Server) vs. KMS (Key Management Service)

Protecting Data with vSphere & vSAN Encryption

Play Episode Listen Later Sep 20, 2018 16:55


VMware virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained within a traditional IT data center world. With vSphere version 6.5 and vSAN version 6.6 VMware customers now have the ability to encrypt VMware managed virtual machines and virtual disk. Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware with encryption and key management. Download this podcast to learn about: vSphere and vSAN encryption Deploying multiple, redundant key servers as a part of the KMS Cluster configuration Meeting compliance regulations and security best practices (PCI DSS, GDPR, etc.)

GDPR, Encryption, & Right of Erasure

Play Episode Listen Later Mar 29, 2018 22:44


The European General Data Protection Regulation (GDPR) is radically transforming the information technology space. Organizations of all sizes and types, and cloud service providers large and small, must adjust to the notion that people now fully own information about themselves. Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to use encryption and key management to help meet GDPR, the right of erasure, also known as the right to be forgotten, and how to avoid bad key management practices which will result in GDPR compliance failures. Download this podcast to learn about: Data security requirements of GDPR Right of erasure (also known as "the right to be forgotten") Meeting GDPR with encryption and key management The importance of standards and best practices

IBM i, Two Factor Authentication, and PCI DSS

Play Episode Listen Later Feb 16, 2018 15:57


PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have. For IBM i users, this usually means a password and an authentication code provided to a token or mobile device. However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become a deprecated method. Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements. Download this podcast to learn about: PCI DSS and NIST requirements for two factor authentication Protecting critical data on the IBM i with two factor authentication Mobile based authentication with Twilio's Authy Introduction to Alliance Two Factor Authentication

Big Data, MongoDB, & Encryption

Play Episode Listen Later Jan 23, 2018 19:15


It is difficult to say big data without instantly thinking about MongoDB. As enterprises adopt MongoDB, they also bring security concerns with them. Depending on their business, they may have multiple government (HIPAA, GDPR, FFIEC, etc.) or business (PCI DSS, etc) security regulatory standards with which they need to comply. Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about leveraging the WiredTiger storage engine, achieving a strong security posture with key management, and how to easily begin encrypting data in MongoDB Enterprise. Download this podcast to learn about: Encryption using the WiredTiger storage engine - no need to buy 3rd party encryption! Easily generate a master encryption key and begin encrypting database keys using native command line operations Meeting compliance requirements (PCI DSS, HIPAA, GDPR, etc.) The importance of KMIP

Securing the IBM i in the Cloud

Play Episode Listen Later Aug 11, 2017 28:07


While the IBM i (AS/400) is considered by many to be a secure platform, it is not immune to data breaches. For this special podcast, Clayton Weise of KeyInfo joins us to discuss running the IBM i in the cloud, maintaining a strong security posture, and common questions about cloud/on-prem hybrid networks. Download this podcast to learn about: IBM i, security, and why customers are moving to the cloud Improving IBM i security posture by moving to cloud Meeting compliance requirements in the cloud Future proofing your IBM i platform

Identify Escalated Privilege Attacks on IBM i

Play Episode Listen Later Jun 27, 2017 16:21


Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server. Download this podcast to learn about: Identifying escalated privilege attacks on the IBM i Determining the true level of authority of a user profile Controlling and monitoring administrative level users Setting email alerts to include critical job and security information

Why Encryption is Critical to Fintech

Play Episode Listen Later Jun 12, 2017 22:00


The financial world is rapidly changing. Innovations in technology are impacting payments, lending, insurance, and even compliance. With huge amounts of private data being dealt with on a daily basis, data security is a top concern - and the best way to protect it is with encryption. Download this podcast to learn about: Encryption and key management Meeting the various compliance requirements Fintech in cloud environments Advice on selecting and evaluating a fintech vendor

Encryption Requirements for Banks & Financial Services

Play Episode Listen Later Mar 30, 2017 18:03


The finance industry is increasingly being held accountable for the security, confidentiality and integrity of non-public customer information. By protecting nonpublic personal information (NPI) and personally identifiable information (PII), businesses in the banking and financial services industry can protect private information including: customer financial records, social security number, income, and account numbers. Organizations that experience a data breach where un-encrypted data is lost can suffer fines reaching into the millions of dollars, as well as face indirect costs like brand damage and customer loss. Download this podcast to learn about: Meeting data security compliance requirements (GLBA, FFIEC, PCI DSS, etc.) Examples of NPI and PII that need to be encrypted Encryption and key management How to take advantage of the GLBA’s “safe harbor” protection for privacy notices

HIPAA Compliance, Business Associates, and Data Security

Play Episode Listen Later Feb 17, 2017 21:24


As Covered Entities take electronic Protected Health Information (ePHI) move to the cloud, they need to understand the important role of having a Business Associate Agreement (BAA) in place and how to ensure that they are meeting HIPAA compliance when ePHI is outside of their walls. Download this podcast to learn about: What is considered electronic Protected Health Information (ePHI) The role of Business Associates (BA) as defined by the Department of Health and Human Services Storing ePHI in the Cloud and meeting HIPAA compliance Key takeaways that vendors can implement today for improved security

The Future of Security Logging on the IBM i

Play Episode Listen Later Jan 10, 2017 26:35


Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs. With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events. Download this podcast to learn about: Current status of security logging on the IBM i The future of log collection and monitoring New logging sources in IBM i V7R3 Elements of an effective active monitoring strategy

IBM i 7.3 Security: New Logs to Collect and Monitor

Play Episode Listen Later Oct 17, 2016 17:57


Active monitoring (sometimes referred to as Continuous Monitoring) is a critical security control for all organizations and is one of the most effective security controls you can deploy. The large majority of security breaches occur on systems that have been compromised days, weeks, or even months before sensitive data is lost. With the release of V7R3, IBM i administrators have additional security logs to collect and monitor. Download this podcast to learn about: Log collection and monitoring on the IBM i New logging sources in IBM i V7R3 System log formats and standards Elements of an effective active monitoring strategy

Protecting Enceryption Keys in AWS

Play Episode Listen Later Aug 9, 2016 22:08


Once data is encrypted, private information depends on key management to stay safe. As enterprises move to the cloud, it is important for key management solutions to provide high-availability, centralized key management to a wide range of applications and databases. Download this podcast to learn about: Encryption key management options in AWS (Key Management Service, Cloud HSM, third-party options) The different approaches to managing encryption keys Resources available to developers and managed service providers (MSPs) How Townsend Security is helping AWS customers protect their encryption keys with centralized key management

Encrypting Data in IBM SoftLayer

Play Episode Listen Later Jun 9, 2016 16:51


VMware and IBM's recent partnership lets customers migrate workloads back and forth between VMware-based private clouds and IBM SoftLayer. Join Patrick Townsend as he discusses what this partnership means (from a security perspective), compliance considerations, and how organizations can better secure their data in IBM SoftLayer. Download this podcast to learn about: Migrating your organization's VMware infrastructure to the cloud What the IBM/VMware partnership means to end users Challenges IBM i customers are facing regarding multi-factor authentication How Townsend Security is helping VMware users move to the cloud

IBM i, PCI DSS 3.2, and Multi-Factor Authentication

Play Episode Listen Later Jun 1, 2016 19:08


Prior to version 3.2 of the PCI Data Security Standard (PCI DSS), remote users were required to use multi-factor authentication for access to all systems processing, transmitting, or storing credit card data. With version 3.2, this is now extended to include ALL local users performing administrative functions in the cardholder data environment (CDE). Download this podcast to learn about: What PCI DSS 3.2 means for IBM i administrators Why it is harder to identifiy an administrative user on the IBM i Challenges IBM i customers are facing regarding multi-factor authentication How Townsend Security is helping organizations meet PCI DSS 3.2 with multi-factor authentication

FIELDPROC Encryption with Legacy RPG Applications on IBM i

Play Episode Listen Later May 23, 2016 16:46


While the IBM DB2 Field Procedures (FieldProc) facility works quite well with native SQL applications, IBM i customers with legacy RPG applications have not been able to take full advantage of FieldProc to encrypt data in DB2 tables. In particular, the encryption of database columns, which are indexes, has been very difficult for IBM i customers using legacy RPG. This results with inability to use FieldProc encryption to protect sensitive data. Download this podcast to learn about: How IBM i customers with legacy RPG applications can deploy automatic DB2 encryption over sensitive data which are indexes How to leverage OAR capabilities to replace the legacy RPG file I/O with modern SQL operations What industries will benefit the most

Securing Data in MongoDB

Play Episode Listen Later May 6, 2016 18:41


Encryption of data at rest, along with good security policies, can help businesses meet compliance regulations like PCI DSS and HIPAA, safeguard enterprise IP, and protect customer PII. While MongoDB provides a mechanism to encrypt data, it is still up to the users to manage encryption keys. Download this podcast to learn about: When MongoDB users would need to deploy encryption and key management Encryption and key management best practices for MongoDB users How MongoDB fits into the larger set of open source and commercial databases The importance of KMIP

HIPAA, HITRUST, Security, and their Relationships

Play Episode Listen Later Apr 11, 2016 20:32


HIPAA requires covered organizations to implement technical safeguards to protect all electronic personal healthcare information (ePHI), making specific reference to encryption, access controls, encryption key management, risk management, auditing, and monitoring of ePHI information. By knowing the relationship of HIPAA and HITRUST, covered entities and business associates can better understand their requirements for protecting ePHI. Download this podcast to learn about: The difference between HIPAA and HITRUST The difference between meeting compliance and managing security risk Protecting ePHI with encryption and key management How Townsend Security is helping covered entities protect ePHI

Defending Data on Linux

Play Episode Listen Later Mar 28, 2016 16:24


While Linux has a reputation as being secure, it is not immune to a data breach. Security administrators and application developers need to take a data-centric approach to protecting their private information – such as their employee data, intellectual property (IP), or customers’ PII. Without the proper controls in place, business applications and information are at risk. This podcast discusses: How developers can better secure their applications Choosing an encryption algorithm Encryption key management Resources for more information

Compliance for Coders - Securing Sensitive Data

Play Episode Listen Later Feb 2, 2016 9:48


As compliance regulations evolve, developers are finding themselves tasked with modifying existing applications to implement new, better security, as well as creating new applications that need to follow security best practices. Listen to this podcast to learn about: Meeting compliance requirements Writing code with a security perspective Encrypting data

Monitoring IBM i Security Logs with IBM QRadar

Play Episode Listen Later Oct 28, 2015 18:27


Collecting real-time security events on the IBM i platform is different than other platforms - logs are stored in many different places in a proprietary IBM format. This presents a challenge for administrators who need to monitor their IBM i logs. Download this podcast to learn about: Real-time security event logging on the IBM i Monitoring your most critical data with IBM Security QRadar Meeting compliance requirements like PCI DSS, HIPAA, FFIEC, and more

How Secure is Encrypted Data in the Cloud?

Play Episode Listen Later Mar 24, 2015 22:31


As cloud storage becomes commonplace, the need to protect and encrypt data grows more important than ever. The critical question becomes, who has access to your encryption keys? Download this podcast to learn about: Download this 20-minute podcast to learn more about: Encrypting data in the cloud Why encrypted data in the cloud may not be as secure as you'd think Special considerations for managing encryption keys in the cloud

VMware and SQL Server Encryption

Play Episode Listen Later Dec 5, 2014 19:54


For SQL Server users in VMware environments, encryption and key management is easier than ever. With a ready-to-deploy OVA formatted solutions, VMware customers can launch an encryption key manager with standard VMware tools and begin securing their sensitive data in SQL Server within minutes. Download this 20-minute podcast to learn more about: • Encrypting data on Microsoft SQL Server in VMware environments • Using Transparent Data Encryption (TDE), Cell Level Encryption, and Extensible Key Management (EKM) • Encrypting data in SQL Server Enterprise and Standard editions

Protecting Data with Encryption in VMware

Play Episode Listen Later Dec 5, 2014 19:35


Every business is trying to save money and reduce complexity in their IT departments, and many are accomplishing this today by using virtual machines such as VMware. While these business's infrastructures are becoming virtual, their security threats are still very much real. Download this 20-minute podcast to learn more about: • Encrypting data in VMware • Encryption performance • Special encryption and key management concerns for VMware users

Encryption, Key Management, & GRC

Play Episode Listen Later Oct 20, 2014 12:28


Data breaches are no longer a matter of “if” but “when”. When developing a data breach response plan it is important to consider the technologies you can implement to help mitigate a data breach, or prevent one from happening altogether. Download this 10-minute podcast to learn more about: * Managing risk by implementing the right technologies * What executives can learn from the latest data breaches * Asking the right data security questions * Encryption in the cloud

Encryption & Key Management in Amazon Web Services (AWS)

Play Episode Listen Later Sep 29, 2014 20:47


Amazon Web Services (AWS) is a deep and rich cloud platform supporting a wide variety of operating systems, services, and third-party applications. What can enterprises do to make sure their data is protected? Download this 20-minute podcast to learn more about: Protecting data in Amazon Web Services (AWS) Securing data in RDS, S3, EBS, and DynamoDB Strategies for deploying a key manager Meeting compliance regulations

Virtualized Encryption & Key Management with VMware

Play Episode Listen Later Sep 8, 2014 13:59


Are there any special considerations for encryption and key management in VMware? This podcast discusses overcoming the challenges of encryption in VMware. Download this 15-minute podcast to learn more about: • Encryption and key management with VMware • How to avoid the common "gotchas" • The importance of certified solutions

Fundamentals of Encryption in Drupal

Play Episode Listen Later Aug 26, 2014 12:56


Developing secure websites in Drupal can be a challenge, especially when it comes to encrypting sensitive data and meeting compliance. Download this 20-minute podcast to learn more about: • Encrypting data in Drupal • What data needs to be encrypted • Encryption key management • Townsend Security's Drupal Developer program

Encryption & Key Management in AWS

Play Episode Listen Later Aug 13, 2014 22:50


While Amazon Web Services (AWS) delivers a secure, scalable cloud computing platform, organizations may be required to deploy an additional layer of security to protect the data they store in the cloud. Download this 20-minute podcast to learn more about:• Protecting data in Amazon Web Services (AWS)• Best practices for deploying a key manager in the cloud• Meeting compliance regulations

SQL Server Encryption Options

Play Episode Listen Later Aug 11, 2014 20:07


Encrypting data in Microsoft SQL Server is often difficult to understand because of the different encryption options offered. Download this 20-minute podcast to learn more about: • Options for encrypting data in Microsoft SQL Server - TDE, Column-• Level, and with the .NET Framework • Managing encryption keys and using Extensible Key Management (EKM) • Automating encryption and key management without TDE & EKM

Encryption Performance, Losing Keys, and Other Encryption Concerns

Play Episode Listen Later May 21, 2014 14:54


Expensive encryption and key management solutions, losing encryption keys, and difficult deployments are now a thing of the past. Download this 20-minute podcast to learn more about: • Encryption performance impacts • Why you shouldn't worry about losing an encryption key • How encryption and key management are now easier than ever

Securing Sensitive Data in the Drupal CMS

Play Episode Listen Later Jan 23, 2014 29:54


Drupal developers who need to protect sensitive data know that storing their encryption keys within the CMS puts their data at risk for a breach. Users who are currently encrypting sensitive data in Drupal are storing the encryption key locally in either a file protected on the server, in the database, or in Drupal’s settings file. None of these methods meet data security best practices or compliance regulations such as PCI DSS, HIPAA/HITECH, state privacy laws, etc. For this special podcast, Chris Teitzel, CEO of Cellar Door Media and Rick Hawkins, owner of Alchemy Web Solutions, join Patrick Townsend, CEO of Townsend Security, to talk about encrypting sensitive data in Drupal.

Encryption Key Management in Windows Azure

Play Episode Listen Later Jan 16, 2014 17:55


As organizations are moving their applications and sensitive data to Windows Azure and leaving behind the traditional data center, they are turning to virtual machines to run their IT infrastructure. Townsend Security recently release the first encryption key manager to run in Microsoft Windows Azure, solving the data security problem that has held many companies back. - Download this podcast to hear Patrick Townsend discuss: - Protecting data in Microsoft Windows Azure - Best practices for deploying a key manager in the cloud - Meeting compliance regulations

Two Factor Authentication on the IBM i

Play Episode Listen Later Jan 9, 2014 17:30


User names and passwords are no longer good enough. To protect sensitive data, businesses need another layer of security and are often turning to two factor authentication. By deploying a two factor authentication solution organizations can easily enhance their security in a cost-effective way, as well as meet compliance regulations and recommendations.

Encryption Key Management - Hardware, Virtualized, and Cloud Compared

Play Episode Listen Later Dec 18, 2013 17:51


With encryption key management now being offered on hardware, virtualized, and cloud platforms, is it simply just a matter of preference or is one option better than another? Download this 20-minute podcast to learn more about: • Deploying encryption key management as an HSM, Cloud HSM, Virtual Appliance (VMware, Hyper-v, Xen) or in the cloud (Windows Azure, Amazon Web Services, vCloud, etc.) • Factors to consider when deciding which option is right or you • What compliance regulations say about the different options • Challenges for applications running in the cloud or virtual environments

Securing Data with Encryption Key Management in the Cloud

Play Episode Listen Later Oct 28, 2013 16:50


Organizations who encrypt data in the cloud regularly report that loss of control of cryptographic keys is a top concern. Advances in encryption technology have made protected sensitive data easier than ever. However, encryption key management has remained a challenge. Organizations are now able to address this problem with the recent introduction of encryption key management in the cloud. Joining us today is Patrick Townsend, CEO of Townsend Security. We will discuss why encryption key management has been difficult for organizations who store their data in the cloud, special considerations for meeting compliance regulations, and what to look for when considering a cloud key management solution.

Guidelines for Effective Encryption Key Management

Play Episode Listen Later Oct 8, 2013 20:50


As more enterprises begin to outsource hosting and move confidential data to the cloud, the protection of encryption keys become the number one action that determines the true effectiveness of their encryption strategy. In this podcast, Patrick Townsend discusses the information security CIA triad (confidentiality, integrity, and availability) and how it relates to encryption key management, what compliance regulations say about managing encryption keys, and how encryption and key management arm enterprises with a strong, defense-in-depth approach to data security.

Gambling with Guests - The House Doesn't Win with Unsecure PII

Play Episode Listen Later Sep 24, 2013 16:25


Is Your Property Management System Really Secure? According to a new report by British insurance firm WIllis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with 38% of those attacks targeting hotels, resorts, and casinos. Property Management Systems (PMS) contain a deep well of Personally Identifiable Information (PII), such as credit card numbers, phone numbers, email addresses, etc., which is often not properly secure within a PMS - leaving users at risk for a breach. Download this podcast to learn: How Property Management Systems can better secure guest data Why the hospitality industry is a target for data thieves How PMS vendors can boost their own security posture How ISVs and Solution Providers can gain additional revenue by offering stronger data security

Must Haves in an Encryption Key Manager

Play Episode Listen Later Sep 6, 2013 15:00


Encryption and key management are now industry standards and work across both legacy and newer business systems, multi-platform and multi-tenant networks, remote access workstations, geographical offices, data centers, and third-party business partners. But how do you know what to take into consideration when deciding on an encryption key manager? Download this podcast to hear Joan Ross, CEO, discuss: "Must Haves" when evaluating an encryption key manager Just because data is encrypted, it doesn't necessarily mean it is safe Principles of effective encryption key management Special considerations for companies who are moving their data into the cloud

PGP Encryption on the IBM i - Securing Data in Motion

Play Episode Listen Later Aug 14, 2013 15:29


PGP encryption has become the de facto standard for securing data in motion on the IBM i. It can help businesses meet compliance regulations such as PCI DSS by encryption credit cards and other PII as it is in transit to your trading partners. In this podcast, Patrick Townsend discusses the differences between Open PGP and Commercial PGP, which version a company who faces compliance regulations should use, and how Townsend Security is helping IBM i users secure their data with PGP encryption.

Reducing Your IT Footprint with Virtualized Encryption Key Management

Play Episode Listen Later Jul 3, 2013 17:14


Server virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained in a physical world. Now Organizations can deploy servers in both their data centers and the cloud using virtualization technologies such as VMware. Download this podcast to hear Patrick Townsend discuss: • The benefits of virtualized encryption key management • How organizations can use virtualized servers in their data centers and the cloud • Special compliance considerations for enterprises who virtualize their infrastructure • What Townsend Security is doing to help organizations deploy virtualized encryption key management

Top IBM i Security Tips with Patrick Botz and Patrick Townsend

Play Episode Listen Later Jun 14, 2013 23:43


As a data security company, we see plenty of organizations think they are doing the right things to keep their data safe, but are falling down on a few key areas. For this special podcast, Patrick Botz of Botz and Associates joins Patrick Townsend to present their top three IBM i security tips to help keep your IBM i secure and data safe.

Got Security? How Retail ISVs Can Improve Their Payment Applications

Play Episode Listen Later Jun 3, 2013 15:52


While payment application vendors are required to certify their payment applications with PCI, compliance regulations are not set in stone and likely to change. Retail ISVs need to be aware of this, and that just because their solution was certified yesterday, their encryption and key management practices might not suffice during their next certification. Join Patrick Townsend, Founder and CEO, as he discusses: • The challenges that POS and Payment Application Vendors have with securing their customers’ data • Why meeting compliance regulations is really the low-bar for data security • How Townsend Security has re-defined what it means to partner with a security company

Stepping Up Security: Easy Ways POS Vendors Can Better Protect Their Customers

Play Episode Listen Later Jun 3, 2013 16:25


Data security is a huge concern for retail companies who expect their point of sale (POS) system vendors to protect their customers’ data. Although POS vendors are required to certify their POS devices with the Payment Card Industry (PCI), many still scrape by with poor encryption and key management practices in their payment applications. Join Patrick Townsend, Founder and CEO, as he discusses: • The challenges that POS vendors have with securing their customers’ data • Why meeting compliance regulations is really the low-bar for data security • How Townsend Security has re-defined what it means to partner with a security company

Managing TrueCrypt Encryption Passwords

Play Episode Listen Later May 20, 2013 16:30


Until recently, password management has been a challenge for TrueCrypt encryption users. Enterprises can now encrypt sensitive data for any Windows application or folder with TrueCrypt and create cryptographically strong passwords with Alliance Key Manager, a FIPS 140-2 compliant key management HSM. In this 15-minute podcast Patrick Townsend discusses: Why an organization would use TrueCrypt encryption Meeting the challenges of managing TrueCrypt passwords What Townsend Security is doing to help organizations manage TrueCrypt passwords

Mobile Security – Protecting Sensitive Data

Play Episode Listen Later May 3, 2013 11:40


With the push to make more data and business applications accessible to workers from their mobile devices, administrators have new security concerns. Security expert Patrick Botz joins us to discuss how to keep valuable data secure in the face of mobility and to offer suggestions on how to simplify this complex issue.

FIELDPROC Encryption on the IBM i

Play Episode Listen Later May 3, 2013 14:54


With IBM ending support on V5R4 of the IBM i later this year, many organizations are in the process of upgrading their systems to V7R1. In V7R1, IBM introduced support for automatic, field-level encryption in the DB2 database called FIELDPROC (short for "Field Procedures"). This allows IBM i users to now deploy encryption without making any program changes. Listen to this podcast to hear Patrick Botz, former lead security architect for IBM, and Patrick Townsend, Founder & CEO, discuss encryption, key management, and meeting compliance regulations on the IBM i.

HIPAA/HITECH Act Breach Notification Meaningful Use Update

Play Episode Listen Later Mar 6, 2013 14:05


The Department of Health and Human Services (HHS) recently released an update to its meaningful use policies about encrypting patient information. They made one thing perfectly clear – the only way to avoid the data breach notification requirement, and potential fines, is to encrypt the data. With small and mid-sized businesses increasingly the target of cyber attacks, the time to address encrypting personal health information (PHI) is now.

Extending the Life of Your IBM i with PHP

Play Episode Listen Later Jan 10, 2013 15:28


Sensitive data can now be automatically encrypted using Townsend Security's NIST-certified encryption libraries and developers can use cross-platform PHP to easily communicate with modern systems. Additionally, PHP can be used to transform complicated green screens into a familiar, simple user interface. For this special podcast, Eric Nies from NSC Software Solutions joins Patrick Townsend, Founder and CEO of Townsend Security, to discuss data security with PHP on the IBM i.

Simplifying Encryption Key Management - Removing Complexity and Cost

Play Episode Listen Later Dec 19, 2012 17:47


Meeting compliance regulations doesn't need to be complex or costly - as long as you are using the correct key management tools. Listen to this podcast to hear Patrick Townsend, Founder & CEO, discuss what compliance requirements require key management, identify the barriers to good key management, and what to look for when evaluating an encryption key manager.

Claim Security Insider - Podcast Edition

In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

Claim Cancel