This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Content provided by Luke Probasco and Townsend Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Luke Probasco and Townsend Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Encrypting Data in IBM SoftLayer
Manage episode 150218684 series 51092
Content provided by Luke Probasco and Townsend Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Luke Probasco and Townsend Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
VMware and IBM's recent partnership lets customers migrate workloads back and forth between VMware-based private clouds and IBM SoftLayer. Join Patrick Townsend as he discusses what this partnership means (from a security perspective), compliance considerations, and how organizations can better secure their data in IBM SoftLayer.
Download this podcast to learn about:
…
continue reading
Download this podcast to learn about:
- Migrating your organization's VMware infrastructure to the cloud
- What the IBM/VMware partnership means to end users
- Challenges IBM i customers are facing regarding multi-factor authentication
- How Townsend Security is helping VMware users move to the cloud
85 episodes
Manage episode 150218684 series 51092
Content provided by Luke Probasco and Townsend Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Luke Probasco and Townsend Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
VMware and IBM's recent partnership lets customers migrate workloads back and forth between VMware-based private clouds and IBM SoftLayer. Join Patrick Townsend as he discusses what this partnership means (from a security perspective), compliance considerations, and how organizations can better secure their data in IBM SoftLayer.
Download this podcast to learn about:
…
continue reading
Download this podcast to learn about:
- Migrating your organization's VMware infrastructure to the cloud
- What the IBM/VMware partnership means to end users
- Challenges IBM i customers are facing regarding multi-factor authentication
- How Townsend Security is helping VMware users move to the cloud
85 episodes
All episodes
×S
Security Insider - Podcast Edition


1 Don’t Let Your Application or Database Limit Your Encryption Strategy 19:28
19:28
Play Later
Play Later
Lists
Like
Liked19:28
With the introduction of vSphere encryption in 6.5 and vSAN 6.6, it has become much easier - and cost-effective - for businesses to encrypt private data. By deploying encryption to protect sensitive workloads in VMware, using the advanced cryptographic permissions in vCenter Server organizations can protect their sensitive information in their internal applications or databases that don’t natively support transparent encryption. Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware’s vSphere and vSAN with encryption and key management. Download this podcast to learn about: Encrypting applications and databases that don't natively support encryption Encryption performance KMIP and encryption key management…
S
Security Insider - Podcast Edition


1 Don’t Forget FIPS and Other Fundamental Key Management Features 22:48
22:48
Play Later
Play Later
Lists
Like
Liked22:48
Over the last several years, encryption key management has attained “essential infrastructure” status. When done properly, key management can protect encrypted data - and in the event of a data breach, can even provide a company with an exemption for a breach notification. Download this podcast to learn about: What enterprises should look for in an encryption key manager The importance of standards (FIPS 140-2, PCI DSS validation, etc.) Meeting data security compliance (PCI DSS, GDPR, HIPAA, etc.) requirements with encryption key management KMS (Key Management Server) vs. KMS (Key Management Service)…
S
Security Insider - Podcast Edition


1 Protecting Data with vSphere & vSAN Encryption 16:55
16:55
Play Later
Play Later
Lists
Like
Liked16:55
VMware virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained within a traditional IT data center world. With vSphere version 6.5 and vSAN version 6.6 VMware customers now have the ability to encrypt VMware managed virtual machines and virtual disk. Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware with encryption and key management. Download this podcast to learn about: vSphere and vSAN encryption Deploying multiple, redundant key servers as a part of the KMS Cluster configuration Meeting compliance regulations and security best practices (PCI DSS, GDPR, etc.)…
S
Security Insider - Podcast Edition


The European General Data Protection Regulation (GDPR) is radically transforming the information technology space. Organizations of all sizes and types, and cloud service providers large and small, must adjust to the notion that people now fully own information about themselves. Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to use encryption and key management to help meet GDPR, the right of erasure, also known as the right to be forgotten, and how to avoid bad key management practices which will result in GDPR compliance failures. Download this podcast to learn about: Data security requirements of GDPR Right of erasure (also known as "the right to be forgotten") Meeting GDPR with encryption and key management The importance of standards and best practices…
S
Security Insider - Podcast Edition


1 IBM i, Two Factor Authentication, and PCI DSS 15:57
15:57
Play Later
Play Later
Lists
Like
Liked15:57
PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have. For IBM i users, this usually means a password and an authentication code provided to a token or mobile device. However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become a deprecated method. Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements. Download this podcast to learn about: PCI DSS and NIST requirements for two factor authentication Protecting critical data on the IBM i with two factor authentication Mobile based authentication with Twilio's Authy Introduction to Alliance Two Factor Authentication…
S
Security Insider - Podcast Edition


It is difficult to say big data without instantly thinking about MongoDB. As enterprises adopt MongoDB, they also bring security concerns with them. Depending on their business, they may have multiple government (HIPAA, GDPR, FFIEC, etc.) or business (PCI DSS, etc) security regulatory standards with which they need to comply. Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about leveraging the WiredTiger storage engine, achieving a strong security posture with key management, and how to easily begin encrypting data in MongoDB Enterprise. Download this podcast to learn about: Encryption using the WiredTiger storage engine - no need to buy 3rd party encryption! Easily generate a master encryption key and begin encrypting database keys using native command line operations Meeting compliance requirements (PCI DSS, HIPAA, GDPR, etc.) The importance of KMIP…
S
Security Insider - Podcast Edition


While the IBM i (AS/400) is considered by many to be a secure platform, it is not immune to data breaches. For this special podcast, Clayton Weise of KeyInfo joins us to discuss running the IBM i in the cloud, maintaining a strong security posture, and common questions about cloud/on-prem hybrid networks. Download this podcast to learn about: IBM i, security, and why customers are moving to the cloud Improving IBM i security posture by moving to cloud Meeting compliance requirements in the cloud Future proofing your IBM i platform…
S
Security Insider - Podcast Edition


1 Identify Escalated Privilege Attacks on IBM i 16:21
16:21
Play Later
Play Later
Lists
Like
Liked16:21
Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server. Download this podcast to learn about: Identifying escalated privilege attacks on the IBM i Determining the true level of authority of a user profile Controlling and monitoring administrative level users Setting email alerts to include critical job and security information…
S
Security Insider - Podcast Edition


The financial world is rapidly changing. Innovations in technology are impacting payments, lending, insurance, and even compliance. With huge amounts of private data being dealt with on a daily basis, data security is a top concern - and the best way to protect it is with encryption. Download this podcast to learn about: Encryption and key management Meeting the various compliance requirements Fintech in cloud environments Advice on selecting and evaluating a fintech vendor…
S
Security Insider - Podcast Edition


1 Encryption Requirements for Banks & Financial Services 18:03
18:03
Play Later
Play Later
Lists
Like
Liked18:03
The finance industry is increasingly being held accountable for the security, confidentiality and integrity of non-public customer information. By protecting nonpublic personal information (NPI) and personally identifiable information (PII), businesses in the banking and financial services industry can protect private information including: customer financial records, social security number, income, and account numbers. Organizations that experience a data breach where un-encrypted data is lost can suffer fines reaching into the millions of dollars, as well as face indirect costs like brand damage and customer loss. Download this podcast to learn about: Meeting data security compliance requirements (GLBA, FFIEC, PCI DSS, etc.) Examples of NPI and PII that need to be encrypted Encryption and key management How to take advantage of the GLBA’s “safe harbor” protection for privacy notices…
S
Security Insider - Podcast Edition


1 HIPAA Compliance, Business Associates, and Data Security 21:24
21:24
Play Later
Play Later
Lists
Like
Liked21:24
As Covered Entities take electronic Protected Health Information (ePHI) move to the cloud, they need to understand the important role of having a Business Associate Agreement (BAA) in place and how to ensure that they are meeting HIPAA compliance when ePHI is outside of their walls. Download this podcast to learn about: What is considered electronic Protected Health Information (ePHI) The role of Business Associates (BA) as defined by the Department of Health and Human Services Storing ePHI in the Cloud and meeting HIPAA compliance Key takeaways that vendors can implement today for improved security…
S
Security Insider - Podcast Edition


1 The Future of Security Logging on the IBM i 26:35
26:35
Play Later
Play Later
Lists
Like
Liked26:35
Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs. With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events. Download this podcast to learn about: Current status of security logging on the IBM i The future of log collection and monitoring New logging sources in IBM i V7R3 Elements of an effective active monitoring strategy…
S
Security Insider - Podcast Edition


1 IBM i 7.3 Security: New Logs to Collect and Monitor 17:57
17:57
Play Later
Play Later
Lists
Like
Liked17:57
Active monitoring (sometimes referred to as Continuous Monitoring) is a critical security control for all organizations and is one of the most effective security controls you can deploy. The large majority of security breaches occur on systems that have been compromised days, weeks, or even months before sensitive data is lost. With the release of V7R3, IBM i administrators have additional security logs to collect and monitor. Download this podcast to learn about: Log collection and monitoring on the IBM i New logging sources in IBM i V7R3 System log formats and standards Elements of an effective active monitoring strategy…
S
Security Insider - Podcast Edition


Once data is encrypted, private information depends on key management to stay safe. As enterprises move to the cloud, it is important for key management solutions to provide high-availability, centralized key management to a wide range of applications and databases. Download this podcast to learn about: Encryption key management options in AWS (Key Management Service, Cloud HSM, third-party options) The different approaches to managing encryption keys Resources available to developers and managed service providers (MSPs) How Townsend Security is helping AWS customers protect their encryption keys with centralized key management…
S
Security Insider - Podcast Edition


VMware and IBM's recent partnership lets customers migrate workloads back and forth between VMware-based private clouds and IBM SoftLayer. Join Patrick Townsend as he discusses what this partnership means (from a security perspective), compliance considerations, and how organizations can better secure their data in IBM SoftLayer. Download this podcast to learn about: Migrating your organization's VMware infrastructure to the cloud What the IBM/VMware partnership means to end users Challenges IBM i customers are facing regarding multi-factor authentication How Townsend Security is helping VMware users move to the cloud…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.