Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by qpcsecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by qpcsecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

File integrity checks (hashing) versus communications or data encryption

29:51
 
Share
 

Manage episode 336711974 series 2981977
Content provided by qpcsecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by qpcsecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

We have seen some really goofy cybersecurity insurance application questions. It is always best to not answer a question that is goofy, but instead to write an addendum that defines terms and explains the cybersecurity posture of an organization related to the topic. You need to try to figure what the insurance company was trying to evaluate rather than just answering their questions because their questions are frequently not suitable for yes/no answers.

Greg Cloon joins me to discuss this topic.

We also touch on when you would use file hash integrity checking, when to use disk encryption, and when to use encryption for communications.

Here's a link to IISCrypto.

https://www.nartac.com/Products/IISCrypto/

  continue reading

98 episodes

Artwork
iconShare
 
Manage episode 336711974 series 2981977
Content provided by qpcsecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by qpcsecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

We have seen some really goofy cybersecurity insurance application questions. It is always best to not answer a question that is goofy, but instead to write an addendum that defines terms and explains the cybersecurity posture of an organization related to the topic. You need to try to figure what the insurance company was trying to evaluate rather than just answering their questions because their questions are frequently not suitable for yes/no answers.

Greg Cloon joins me to discuss this topic.

We also touch on when you would use file hash integrity checking, when to use disk encryption, and when to use encryption for communications.

Here's a link to IISCrypto.

https://www.nartac.com/Products/IISCrypto/

  continue reading

98 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play