Home  /  Podcast Directory  /  Technology  /  Security Insider - Podcast Edition


Last update: 2013-06-14

Top IBM i Security Tips with Patrick Botz and Patrick Townsend

2013-06-14 :: Townsend Security
Length: 23s

As a data security company, we see plenty of organizations think they are doing the right things to keep their data safe, but are falling down on a few key areas.

For this special podcast, Patrick Botz of Botz and Associates joins Patrick Townsend to present their top three IBM i security tips to help keep your IBM i secure and data safe.

x

Share: Top IBM i Security Tips with Patrick Botz and Patrick Townsend


Got Security? How Retail ISVs Can Improve Their Payment Applications

2013-06-03 :: Townsend Security
Length: 15s

While payment application vendors are required to certify their payment applications with PCI, compliance regulations are not set in stone and likely to change. Retail ISVs need to be aware of this, and that just because their solution was certified yesterday, their encryption and key management practices might not suffice during their next certification.

Join Patrick Townsend, Founder and CEO, as he discusses:
• The challenges that POS and Payment Application Vendors have with securing their customers’ data
• Why meeting compliance regulations is really the low-bar for data security
• How Townsend Security has re-defined what it means to partner with a security company

x

Share: Got Security? How Retail ISVs Can Improve Their Payment Applications


Stepping Up Security: Easy Ways POS Vendors Can Better Protect Their Customers

2013-06-03 :: Townsend Security
Length: 16s

Data security is a huge concern for retail companies who expect their point of sale (POS) system vendors to protect their customers’ data. Although POS vendors are required to certify their POS devices with the Payment Card Industry (PCI), many still scrape by with poor encryption and key management practices in their payment applications.

Join Patrick Townsend, Founder and CEO, as he discusses:
• The challenges that POS vendors have with securing their customers’ data
• Why meeting compliance regulations is really the low-bar for data security
• How Townsend Security has re-defined what it means to partner with a security company

x

Share: Stepping Up Security: Easy Ways POS Vendors Can Better Protect Their Customers


Managing TrueCrypt Encryption Passwords

2013-05-20 :: Townsend Security
Length: 16s

Until recently, password management has been a challenge for TrueCrypt encryption users. Enterprises can now encrypt sensitive data for any Windows application or folder with TrueCrypt and create cryptographically strong passwords with Alliance Key Manager, a FIPS 140-2 compliant key management HSM.

In this 15-minute podcast Patrick Townsend discusses:

Why an organization would use TrueCrypt encryption
Meeting the challenges of managing TrueCrypt passwords
What Townsend Security is doing to help organizations manage TrueCrypt passwords

x

Share: Managing TrueCrypt Encryption Passwords


Mobile Security – Protecting Sensitive Data

2013-05-03 :: Townsend Security
Length: 11s

With the push to make more data and business applications accessible to workers from their mobile devices, administrators have new security concerns. Security expert Patrick Botz joins us to discuss how to keep valuable data secure in the face of mobility and to offer suggestions on how to simplify this complex issue.…

x

Share: Mobile Security – Protecting Sensitive Data


FIELDPROC Encryption on the IBM i

2013-05-03 :: Townsend Security
Length: 14s

With IBM ending support on V5R4 of the IBM i later this year, many organizations are in the process of upgrading their systems to V7R1. In V7R1, IBM introduced support for automatic, field-level encryption in the DB2 database called FIELDPROC (short for "Field Procedures"). This allows IBM i users to now deploy encryption without making any program changes.

Listen to this podcast to hear Patrick Botz, former lead security architect for IBM, and Patrick Townsend, Founder & CEO, discuss encryption, key management, and meeting compliance regulations on the IBM i.…

x

Share: FIELDPROC Encryption on the IBM i


HIPAA/HITECH Act Breach Notification Meaningful Use Update

2013-03-06 :: Townsend Security
Length: 14s

The Department of Health and Human Services (HHS) recently released an update to its meaningful use policies about encrypting patient information. They made one thing perfectly clear – the only way to avoid the data breach notification requirement, and potential fines, is to encrypt the data. With small and mid-sized businesses increasingly the target of cyber attacks, the time to address encrypting personal health information (PHI) is now.…

x

Share: HIPAA/HITECH Act Breach Notification Meaningful Use Update


Extending the Life of Your IBM i with PHP

2013-01-10 :: Townsend Security
Length: 15s

Sensitive data can now be automatically encrypted using Townsend Security's NIST-certified encryption libraries and developers can use cross-platform PHP to easily communicate with modern systems. Additionally, PHP can be used to transform complicated green screens into a familiar, simple user interface.

For this special podcast, Eric Nies from NSC Software Solutions joins Patrick Townsend, Founder and CEO of Townsend Security, to discuss data security with PHP on the IBM i.…

x

Share: Extending the Life of Your IBM i with PHP


Simplifying Encryption Key Management - Removing Complexity and Cost

2012-12-19 :: Townsend Security
Length: 17s

Meeting compliance regulations doesn't need to be complex or costly - as long as you are using the correct key management tools.

Listen to this podcast to hear Patrick Townsend, Founder & CEO, discuss what compliance requirements require key management, identify the barriers to good key management, and what to look for when evaluating an encryption key manager.…

x

Share: Simplifying Encryption Key Management - Removing Complexity and Cost


IBM i Has Single Sign On (SSO) - You Just Have to Enable It!

2012-11-27 :: Townsend Security
Length: 18s

Password management continues to be a challenge for all organizations - large and small. Poor management leads to insecure passwords and inconsistent policies – and these lead to more data breaches.

For this special podcast, Patrick Botz joins us to talk about Single Sign On on the IBM i and how it can be used to easily and securely manage user accounts and passwords.…

x

Share: IBM i Has Single Sign On (SSO) - You Just Have to Enable It!


File Integrity Monitoring (FIM) on the IBM i

2012-10-31 :: Townsend Security
Length: 15s

File Integrity Monitoring (FIM) tools allow administrators to selectively monitor data access and change activity at the column or field level - without changing applications or user accounts. Join Patrick Townsend as he discusses why implementing FIM tools is a best practice and compliance requirement, how administrators are using them, and what makes the Townsend Security solution unique.…

x

Share: File Integrity Monitoring (FIM) on the IBM i


Microsoft Azure - Securing Data with Encryption and Key Management

2012-10-12 :: Townsend Security
Length: 16s

As organizations adopt Microsoft’s Azure cloud offering, one of the top questions we hear is “How do I protect my sensitive data?”

In this podcast, Patrick Townsend discusses protecting sensitive data in Azure with encryption and key management, performance considerations, best practices for managing encryption keys, and what to look for when deciding on an encryption key management solution. Additionally, we discuss the importance of having a key management strategy that lines up with the various compliance regulations.…

x

Share: Microsoft Azure - Securing Data with Encryption and Key Management


Higher Education Under Attack - Data Privacy 101

2012-08-24 :: Townsend Security
Length: 12s

Recently colleges and universities have become a target for data thieves and are suffering an increased number of data breaches. This podcast discusses why these organizations are experiencing a higher level of attacks, as well as what they can do to protect themselves. Additionally, learn four things to increase your data security that you can get started with today.…

x

Share: Higher Education Under Attack - Data Privacy 101


Securing SharePoint with Encryption and Key Management

2012-08-20 :: Townsend Security
Length: 12s

Do you use Microsoft SharePoint in your organization to share documents that contain sensitive information? Did you know that these documents probably fall under compliance laws and regulations?

Join Patrick Townsend as he discusses why businesses need to secure their SharePoint servers, how easy it can be, and where he sees users falling down with their data protection strategy.…

x

Share: Securing SharePoint with Encryption and Key Management


Tape Encryption - Not Enough

2012-07-23 :: Townsend Security
Length: 16s

While creating encrypted backup tapes is an excellent practice, for many organizations it is often the only time their data gets encrypted. Patrick Townsend discusses some misconceptions he is seeing around encryption and tape backups, what organizations should be doing to secure their sensitive data before it gets backed up to tape, and what compliance regulations say on when data needs to be encrypted.…

x

Share: Tape Encryption - Not Enough


How LinkedIn Could Have Avoided a Breach

2012-06-08 :: Townsend Security
Length: 15s

LinkedIn recently experienced a data breach that exposed over 6.5 million hashed passwords. While few details have been offered about the attack itself, LinkedIn could have avoided this breach if they had proper security processes in place.…

x

Share: How LinkedIn Could Have Avoided a Breach


System Logging on the IBM i - How to Do it Better

2012-05-01 :: Townsend Security
Length: 15s

Collecting and monitoring system logs has become a hot topic for organizations that need to meet compliance regulations. Logging on the IBM i (AS/400) is different than other platforms and something an organization should not take the “do it yourself” approach.…

x

Share: System Logging on the IBM i - How to Do it Better


Protect PHI & Manage Risk - HIPAA Compliance

2012-04-19 :: Townsend Security
Length: 19s

The frequency of data breaches in healthcare have increased 32% in the past year and cost an estimated $6.5 billion annually. Fortunately, if you are protecting your Personal Health Information (PHI) with proper encryption and key management, you are exempt from a breach notification.

Learn how ow a company can achieve Safe Harbor status in the event of a breach, as well as best practices for encryption, key management, and secure system logging.…

x

Share: Protect PHI & Manage Risk - HIPAA Compliance


IBM i Security: Skip V6R1 and Upgrade to V7R1

2012-03-16 :: Townsend Security
Length: 14s

IBM recently announced the end of support date for V5R4. This will prompt many IBM i shops to upgrade to a newer release - either V6R1 or V7R1. This podcast will discuss the security reasons that you should go straight to V7R1. Additionally, we will discuss how Townsend Security can help you take advantage of FIELDPROC, a new addition to V7R1 that allows companies to encrypt their sensitive data without changing their applications.…

x

Share: IBM i Security: Skip V6R1 and Upgrade to V7R1


Secure Managed File Transfer on the IBM i - An Introduction

2012-03-08 :: Townsend Security
Length: 16s

Learn what secure managed file transfer is, how it can help you meet compliance regulations, and what to look for in a secure managed file transfer solution. Additionally, we will discuss how Townsend Security can help make your managed file transfers secure with PGP encryption.…

x

Share: Secure Managed File Transfer on the IBM i - An Introduction


System Logging on the IBM i: Getting Started

2012-01-13 :: Townsend Security
Length: 16s

Like other IT projects, the implementation of up-to-date logging requires careful planning. For example: systems need to be monitored and the parameters related to security and archiving need to be defined.

This podcast discusses what system logging is, how logging can help you meet compliance requirements, and what to look for in a logging solution. Additionally, learn how Townsend Security can help you transmit the logs from your IBM to any SIEM console.

x

Share: System Logging on the IBM i: Getting Started


IBM i FIELDPROC Performance: Speed Matters

2011-12-02 :: Townsend Security
Length: 14s

FIELDPROC has made encryption on the IBM i much easier. It is now possible to encrypt your databases with NO APPLICATION CHANGES! The question is, what are the performance impacts?
Patrick Townsend explains why the speed of your encryption is important, what to look for when deciding on a solution, and simple tests that listeners can do to help decide which FIELDPROC encryption solution is right for them.…

x

Share: IBM i FIELDPROC Performance: Speed Matters


IBM i FIELDPROC Performance: Speed Matters

2011-12-02 :: Townsend Security
Length: 14s

FIELDPROC has made encryption on the IBM i much easier. It is now possible to encrypt your databases with NO APPLICATION CHANGES! The question is, what are the performance impacts?
Patrick Townsend explains why the speed of your encryption is important, what to look for when deciding on a solution, and simple tests that listeners can do to help decide which FIELDPROC encryption solution is right for them.…

x

Share: IBM i FIELDPROC Performance: Speed Matters


HIPAA, HITECH Act, & Encryption Key Management

2011-10-04 :: Townsend Security
Length: 15s

Today's topic is HPAA and the HITECH Act, and what they say about encryption and key management. Additionally, learn how to avoid breach notifications and what Townsend Security can do to help your organization meet these compliance requirements.…

x

Share: HIPAA, HITECH Act, & Encryption Key Management


Encryption Key Management and Microsoft SQL Server 2008

2011-07-01 :: Townsend Security
Length: 24s

Learn about SQL Server 2008 EKM and what Microsoft customers should be thinking about when they consider using SQL Server EKM for encryption. Also, learn what role a Hardware Security Module or HSM plays and what to look for when selecting an encryption key management HSM.…

x

Share: Encryption Key Management and Microsoft SQL Server 2008


Emerging Data Privacy Regulations

2011-04-12 :: Townsend Security
Length: 24s

Organizations need to comply with a growing number of data privacy regulations. Patrick discusses the various regulations - such as PCI, HIPAA/HITECH, and state privacy laws - as well as how to meet the regulations and what it is like to have an audit.…

x

Share: Emerging Data Privacy Regulations


Benefits of Transparent Encryption on IBM i

2011-04-06 :: Townsend Security
Length: 23s

Transparent encryption is new to IBM i 7.1. Learn about the new FieldProc capabilities and the benefits of transparent encryption, as well as what FieldProc is and isn’t. Additionally, Patrick discusses the new security risks associated with the new FieldProc APIs and what Townsend Security is doing to help the people who have moved, or are thinking about moving to the latest IBM OS release.…

x

Share: Benefits of Transparent Encryption on IBM i


Key Management for Microsoft Windows

2011-03-25 :: Townsend Security
Length: 15s

Compliance regulations require proper key management. Learn why encryption key management is a concern for Microsoft Windows users, some of the technical challenges in using good key management, and how Townsend Security can help Microsoft partners.…

x

Share: Key Management for Microsoft Windows


Data Privacy for the Non-Technical Person

2011-03-22 :: Townsend Security
Length: 16s

Learn what constitutes personally identifiable information (PII) and how to protect it with strong AES encryption and key management. Additionally, learn about compliance regulations and how your organization can begin to develop a security policy.…

x

Share: Data Privacy for the Non-Technical Person


PCI DSS v2.0: Changes for Your Organization

2011-02-24 :: Townsend Security
Length: 27s

New PCI Data Security Standards have been announced. Patrick Townsend of Townsend Security, a PCI SSC participating organization, speaks on best practices for meeting PCI compliance regulations and provides insight and commentary on the changes in compliance and enforcement.…

x

Share: PCI DSS v2.0: Changes for Your Organization


Key Management Best Practices: What New PCI Regulations Say

2011-01-19 :: Townsend Security
Length: 19s

The new PCI Data Security Standards (PCI DSS v2.0) are here and we’ve gotten a lot of questions about the changes related to encryption key management. Because we work with a lot of companies going through PCI compliance audits and reviews, the new standards just confirm the trends we’ve seen over the last few months on how QSA auditors and security professionals view encryption key management, and what they see as the minimum requirements for managing keys.

In this podcast, Patrick Townsend speaks on current best practices, as well as what PCI has to say about integrated key management (why it isn't a good thing), dual control, separation of duties, and split knowledge.…

x

Share: Key Management Best Practices: What New PCI Regulations Say


The Data Protection Trifecta: Tokenization, Encryption, and Key Management

2010-08-16 :: Townsend Security
Length: 27s

Tokenization, Encryption, and Key Management are discussed and why each technology is a necessary component for a comprehensive data protection plan. Additionally, Patrick discusses why NIST certification is important, as well as what VISA has to say regarding best practices with these technologies.…

x

Share: The Data Protection Trifecta: Tokenization, Encryption, and Key Management


Achieving Exemption from the HITECH Law

2010-05-06 :: Townsend Security
Length: 17s

HIPAA and HITECH are mandating encryption of sensitive medical and personal information. But all encryption is not created equal. Find out what NIST certification is, and how it gives you safe harbor status even if you experience a major data loss.…

x

Share: Achieving Exemption from the HITECH Law


The Many Flavors of Data Protection: Deciding What’s Right for Your IBM i Enterprise

2010-03-29 :: Townsend Security
Length: 20s

Patrick Townsend discusses data security and the technologies available to protect your IBM i – from tokenization to various types of encryption. You’ll discover the uses for each, and which best fit your data protection strategy. Includes tips on choosing the right technology.…

x

Share: The Many Flavors of Data Protection: Deciding What’s Right for Your IBM i Enterprise


The Business Case for Tokenization

2009-12-29 :: Townsend Security
Length: 21s

Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.…

x

Share: The Business Case for Tokenization


Data Tokenization: Separating Fact from Myth

2009-10-27 :: Townsend Security
Length: 19s

Tokenization is a hot topic in data security and the payment card industry today. But there is misinformation in the marketplace. Patrick Townsend talks about what tokenization is and is not, and offers advice on how it can help you comply with data security regulations.…

x

Share: Data Tokenization: Separating Fact from Myth


PCI & the Audit: What Mid-Size Companies Need to Know

2009-08-12 :: Townsend Security
Length: 13s

Level 2 merchants are about to be put under the PCI audit microscope. Patrick Townsend gives a brief overview about what this means to your business, plus how and when to prepare for this and other pending regulatory changes.…

x

Share: PCI & the Audit: What Mid-Size Companies Need to Know


Secure File Transfer Changes for the IBM i

2009-07-14 :: Townsend Security
Length: 18s

A discussion of existing and new regulations that are changing the way System i users handle secure file transfer. Also includes information about solutions available to help the Enterprise meet today’s compliance challenges.…

x

Share: Secure File Transfer Changes for the IBM i


The Government's Growing Role in Data Security

2009-06-26 :: Townsend Security
Length: 20s

More and more government agencies are getting involved in data security and encryption. NIST powers are on the rise, and more stringent state and federal legislation is driving businesses large and small to invest in data security. Find out why, and what this means to the future of data encryption.…

x

Share: The Government's Growing Role in Data Security


XML in Tough Times

2009-06-03 :: Townsend Security
Length: 14s

Townsend CEO discusses XML and web services for the IBM i. Includes case studies of Pottery Barn and Bass Pro Shops. They increased revenue & decreased costs, your Enterprise can too.…

x

Share: XML in Tough Times


Encryption Key Management

2009-06-02 :: Townsend Security
Length: 17s

Encryption Key ManagementEncryption key management is in the spotlight thanks to auditors and pending laws. Get key manager basics, and tips for evaluating a solution for your Enterprise.…

x

Share: Encryption Key Management


RSA & COMMON Expo Recap

2009-05-12 :: Townsend Security
Length: 12s

This interview with Patrick Townsend of Patrick Townsend Security Solutions recaps his experiences at the recent RSA and Common 2009 Expos. The podcast serves as a wrap-up of the tradeshows and highlights significant developments in data security, encryption, and key management.…

x

Share: RSA & COMMON Expo Recap


Massachusetts Privacy Law - 2010

2009-04-30 :: Townsend Security
Length: 11s

The Massachusetts Privacy law goes into effect January 1, 2010. Find out how it will affect your Enterprise and your IT infrastructure in this conversation with the President and CEO of Patrick Townsend Security Solutions.…

x

Share: Massachusetts Privacy Law - 2010


Intro to Patrick Townsend and His Company

2009-04-30 :: Townsend Security
Length: 7s

An introduction to Patrick Townsend Security Solutions by the company’s President & CEO Patrick Townsend. This interview covers the company’s origins, its current focus, and what's on the horizon for the data security industry.…

x

Share: Intro to Patrick Townsend and His Company


Security Insider - Podcast Edition

Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.

Security Insider - Podcast Edition


Switch to our mobile site