<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
    <channel>
        <title>Security Insider - Podcast Edition</title>
        <description>Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.</description>
        <link>http://www.townsendsecurity.com</link>
        <copyright>© 2011 Townsend Security</copyright>
        <language>en</language>
        <lastBuildDate>Thu, 19 Sep 2019 15:08:38 -0700</lastBuildDate>
        <pubDate>Thu, 19 Sep 2019 15:06:27 -0700</pubDate>
        <generator>FeedForAll Mac v2.1 (2.1.0.1); http://www.FeedForAll.com/</generator>
        <itunes:subtitle>Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.</itunes:subtitle>
        <itunes:summary>Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.</itunes:summary>
        <itunes:category text="Technology"/>
        <itunes:keywords>data security, encryption, pci, hipaa, KMIP, encryption, aes, pgp, key management, patrick townsend, enterprise, compliance</itunes:keywords>
        <itunes:author>Townsend Security</itunes:author>
        <itunes:owner>
            <itunes:email>luke.probasco@townsendsecurity.com</itunes:email>
            <itunes:name>Luke Probasco</itunes:name>
        </itunes:owner>
        <itunes:image href="http://www.townsendsecurity.com/downloads/podcast/Art.jpg" />
        <itunes:explicit>no</itunes:explicit>
        <image>
            <url>https://downloads.townsendsecurity.com/podcast/Art144.jpg</url>
            <title>Security Insider - Podcast Edition</title>
            <link>https://downloads.townsendsecurity.com/podcast/Art144.jpg</link>
            <description></description>
            <width>144</width>
            <height>144</height>
        </image>
        <item>
            <title>State of Encryption Key Management - 2020</title>
            <description>By many, encryption is considered the hardest part of data security, and key management the hardest part of encryption. As such, it is far too common to see businesses not properly storing their encryption keys - for example, keeping them in a database in the clear or even burned into their application’s code. This podcast discusses the latest trends and perspectives around encryption key management and how to better protect your data.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
The current state of encryption key management&lt;br /&gt;
&lt;br /&gt;
Databases/applications that natively support encryption key management&lt;br /&gt;
&lt;br /&gt;
Meeting evolving compliance requirements&lt;br /&gt;
&lt;br /&gt;
</description>
            <link>https://downloads.townsendsecurity.com/podcast/2020/041320State.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2020/041320State.mp3" length="36508670" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E2318DDE-D1E0-4DD3-8B28-D7DBB4CDFCDF-48391-0000A46ECE01A262-FFA</guid>
            <pubDate>Mon, 13 April 2020 09:39:31 -0700</pubDate>
            <itunes:subtitle>By many, encryption is considered the hardest part of data security, and key management the hardest part of encryption.  </itunes:subtitle>
            <itunes:summary>By many, encryption is considered the hardest part of data security, and key management the hardest part of encryption. As such, it is far too common to see businesses not properly storing their encryption keys - for example, keeping them in a database in the clear or even burned into their application’s code. This podcast discusses the latest trends and perspectives around encryption key management and how to better protect your data.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the current state of encryption key management, databases/applications that natively support encryption key management, meeting evolving compliance requirements, and how to save money with encryption key management.
</itunes:summary>
            <itunes:duration>25:17</itunes:duration>
            <itunes:keywords>encryption, key management, VMware, encryption, compliance, cyber security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>
		<item>
            <title>Key Management in IBM Cloud for VMware</title>
            <description>Running VMware in IBM Cloud provides businesses a way to consolidate legacy infrastructures onto an automated and centrally managed, software-deﬁned data center - and quickly address current resource constraints by deploying workloads. One of the things they are doing differently is providing enhanced security with bare metal servers in a hosted private cloud with provider-managed encryption of data at rest.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
Securing data in IBM Cloud for VMware&lt;br /&gt;
&lt;br /&gt;
The benefits of running VMware in the Cloud&lt;br /&gt;
&lt;br /&gt;
Encryption key management&lt;br /&gt;
&lt;br /&gt;
</description>
            <link>https://downloads.townsendsecurity.com/podcast/2019/120619-IBM-Cloud.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2019/120619-IBM-Cloud.mp3" length="35003929" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E2318DDE-D1E0-4DD3-8B28-D7DBB4CDFCDF-48391-0000A46ECE01A262-FFA</guid>
            <pubDate>Fri, 06 Dec 2019 09:39:31 -0700</pubDate>
            <itunes:subtitle>One of the things IBM Cloud is doing differently is providing enhanced security with bare metal servers in a hosted private cloud.  </itunes:subtitle>
            <itunes:summary>Running VMware in IBM Cloud provides businesses a way to consolidate legacy infrastructures onto an automated and centrally managed, software-deﬁned data center - and quickly address current resource constraints by deploying workloads. One of the things they are doing differently is providing enhanced security with bare metal servers in a hosted private cloud with provider-managed encryption of data at rest.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses securing data in IBM Cloud for VMware, the benefits of running VMware in the cloud, and encryption key management.
</itunes:summary>
            <itunes:duration>23:48</itunes:duration>
            <itunes:keywords>IBM, Cloud, VMware, encryption, key managaement, data security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
            <title>SQL Server Standard Edition and TDE</title>
            <description>Like Microsoft SQL Server Enterprise Edition users, Microsoft SQL Server 2019 Standard Edition users can now easily meet compliance (PCI DSS, GDPR, CCPA, etc.) and protect private data like customer PII and intellectual property without modifying existing applications or the database. By using the database’s Transparent Data Encryption (TDE), coupled with an encryption key manager, organizations can protect their private data at a lower cost.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
Encryption and key management in SQL Server 2019&lt;br /&gt;
&lt;br /&gt;
Deploying Transparent Data Encryption (TDE) along with Extensible Key Management (EKM)&lt;br /&gt;
&lt;br /&gt;
Encryption key management in the cloud&lt;br /&gt;
&lt;br /&gt;
</description>
            <link>https://downloads.townsendsecurity.com/podcast/2019/120619-TDE.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2019/120619-TDE.mp3" length="33469681" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E2318DDE-D1E0-4DD3-8B28-D7DBB4CDFCDF-48391-0000A46ECE01A262-FFA</guid>
            <pubDate>Fri, 06 Dec 2019 09:35:31 -0700</pubDate>
            <itunes:subtitle>By using the TDE, coupled with an encryption key manager, organizations can protect their private data at a lower cost.  </itunes:subtitle>
            <itunes:summary>Like Microsoft SQL Server Enterprise Edition users, Microsoft SQL Server 2019 Standard Edition users can now easily meet compliance (PCI DSS, GDPR, CCPA, etc.) and protect private data like customer PII and intellectual property without modifying existing applications or the database. By using the database’s Transparent Data Encryption (TDE), coupled with an encryption key manager, organizations can protect their private data at a lower cost.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses encryption and key management in SQL Server 2019, deploying TDE and EKM, and encryption key management in the cloud.
</itunes:summary>
            <itunes:duration>22:44</itunes:duration>
            <itunes:keywords>Microsoft, encryption, key managaement, data security, SQL Server</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>
		<item>
            <title>Living on the Edge</title>
            <description>As the world of edge computing becomes more distributed, billions of connected devices live on the edge, which need to be secured, managed and automated. For many businesses, this means deploying a VMware and cloud infrastructure and using VMware vSphere, for example, to encrypt private information.  While it is easy enough to encrypt data on the edge, key management has proven to be somewhat of a challenge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
What is special about edge computing&lt;br /&gt;
&lt;br /&gt;
Security considerations with edge computing&lt;br /&gt;
&lt;br /&gt;
Compliance considerations with edge computing&lt;br /&gt;
&lt;br /&gt;
</description>
            <link>https://downloads.townsendsecurity.com/podcast/2019/120219-edge.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2019/120219-edge.mp3" length="32079239" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E2318DDE-D1E0-4DD3-8B28-D7DBB4CDFCDF-48391-0000A46ECE01A262-FFA</guid>
            <pubDate>Tues, 19 Nov 2019 09:35:31 -0700</pubDate>
            <itunes:subtitle>While it is easy enough to encrypt data on the edge, key management has proven to be somewhat of a challenge.  </itunes:subtitle>
            <itunes:summary>As the world of edge computing becomes more distributed, billions of connected devices live on the edge, which need to be secured, managed and automated. For many businesses, this means deploying a VMware and cloud infrastructure and using VMware vSphere, for example, to encrypt private information.  While it is easy enough to encrypt data on the edge, key management has proven to be somewhat of a challenge.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses security considerations with edge computing, compliance considerations, and examples of securign data on the edge.
</itunes:summary>
            <itunes:duration>21:46</itunes:duration>
            <itunes:keywords>Edge, encryption, key managaement, data security, VMware</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
            <title>MySQL Encryption & Managing Keys</title>
            <description>MySQL is the world’s most popular open-source database and consequently stores enormous amounts of sensitive data. MySQL Enterprise Edition includes standards based encryption, along with KMIP support for key management. With the combination of these two, MySQL users can be confident that they are protecting their private data against a breach and meeting compliance requirements and security best practices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
Leveraging MySQL Enterprise encryption to protect PII and IP&lt;br /&gt;
&lt;br /&gt;
Other ways that businesses can better secure their private data - including IP and customer information&lt;br /&gt;
</description>
            <link>https://downloads.townsendsecurity.com/podcast/2019/111919-mysql.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2019/111919-mysql.mp3" length="36430208" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E2318DDE-D1E0-4DD3-8B28-D7DBB4CDFCDF-48391-0000A46ECE01A262-FFA</guid>
            <pubDate>Tues, 19 Nov 2019 09:35:31 -0700</pubDate>
            <itunes:subtitle>MySQL Enterprise Edition includes standards based encryption, along with KMIP support for key management.  </itunes:subtitle>
            <itunes:summary>MySQL is the world’s most popular open-source database and consequently stores enormous amounts of sensitive data. MySQL Enterprise Edition includes standards based encryption, along with KMIP support for key management. With the combination of these two, MySQL users can be confident that they are protecting their private data against a breach and meeting compliance requirements and security best practices.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses leveraging MySQL encryption, achieving a strong security posture with key management, and other ways that businesses can better secure their private data - including IP and customer information.
</itunes:summary>
            <itunes:duration>24:48</itunes:duration>
            <itunes:keywords>MySQL, Data Security, encryption, key management, TDE</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
            <title>California Consumer Privacy Act (CCPA) - What You Need to Know</title>
            <description>The California Consumer Privacy Act (CCPA) is a big deal. Almost no one is ready for it, so you are not alone if you are just getting familiar with the CCPA requirements. While similar to GDPR, CCPA is quite broad and extends into areas not covered under GDPR and other regulations.&lt;br /&gt;
&lt;br /&gt;
Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the California Consumer Privacy Act (CCPA), which organizations are required to meet the law, rights granted to consumers, and what information it covers.&lt;br /&gt;
&lt;br /&gt;Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
Which organizations are required to meet CCPA&lt;br /&gt;
&lt;br /&gt;
What companies can do to better protect customer information&lt;br /&gt;
&lt;br /&gt;
Data that needs protected under CCPA</description>
            <link>https://downloads.townsendsecurity.com/podcast/2019/101719-CCPA.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2019/101719-CCPA.mp3" length="29760851" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E2318DDE-D1E0-4DD3-8B28-D7DBB4CDFCDF-48391-0000A46ECE01A262-FFA</guid>
            <pubDate>Thu, 17 Oct 2019 15:35:31 -0700</pubDate>
            <itunes:subtitle>Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the California Consumer Privacy Act (CCPA), which organizations are required to meet the law, rights granted to consumers, and what information it covers.</itunes:subtitle>
            <itunes:summary>The California Consumer Privacy Act (CCPA) is a big deal. Almost no one is ready for it, so you are not alone if you are just getting familiar with the CCPA requirements. While similar to GDPR, CCPA is quite broad and extends into areas not covered under GDPR and other regulations.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the California Consumer Privacy Act (CCPA), which organizations are required to meet the law, rights granted to consumers, and what information it covers.

Download this podcast to learn about:
- Which organizations are required to meet CCPA

- Which organizations are required to meet CCPA

- Data that needs protected under CCPA</itunes:summary>
            <itunes:duration>20:10</itunes:duration>
            <itunes:keywords>CCPA, California Consumer Privacy Act, Data Security, encryption, key management</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
            <title>Don’t Let Your Application or Database Limit Your Encryption Strategy</title>
            <description>With the introduction of vSphere encryption in 6.5 and vSAN 6.6, it has become much easier - and cost-effective - for businesses to encrypt private data. By deploying encryption to protect sensitive workloads in VMware, using the advanced cryptographic permissions in vCenter Server organizations can protect their sensitive information in their internal applications or databases that don’t natively support transparent encryption.&lt;br /&gt;
&lt;br /&gt;
Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware’s vSphere and vSAN with encryption and key management.&lt;br /&gt;
&lt;br /&gt;Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
Encrypting applications and databases that don't natively support encryption&lt;br /&gt;
&lt;br /&gt;
Encryption performance&lt;br /&gt;
&lt;br /&gt;
KMIP and encryption key management</description>
            <link>https://downloads.townsendsecurity.com/podcast/2019/091919-encryption-strategy.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2019/091919-encryption-strategy.mp3" length="28762142" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E2318DDE-D1E0-4DD3-8B28-D7DBB4CDFCDF-48391-0000A46ECE01A262-FFA</guid>
            <pubDate>Thu, 19 Sep 2019 15:08:31 -0700</pubDate>
            <itunes:subtitle>Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware’s vSphere and vSAN with encryption and key management.</itunes:subtitle>
            <itunes:summary>With the introduction of vSphere encryption in 6.5 and vSAN 6.6, it has become much easier - and cost-effective - for businesses to encrypt private data. By deploying encryption to protect sensitive workloads in VMware, using the advanced cryptographic permissions in vCenter Server organizations can protect their sensitive information in their internal applications or databases that don’t natively support transparent encryption.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware’s vSphere and vSAN with encryption and key management.

Download this podcast to learn about:
- Encrypting applications and databases that don't natively support encryption

- Encryption performance

- KMIP and encryption key management</itunes:summary>
            <itunes:duration>19:28</itunes:duration>
            <itunes:keywords>VMware, vSphere, vSAN, encryption, key management, KMIP, Data Security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Don’t Forget FIPS and Other Fundamental Key Management Features</title>
            <description>Over the last several years, encryption key management has attained “essential infrastructure” status. When done properly, key management can protect encrypted data - and in the event of a data breach, can even provide a company with an exemption for a breach notification.&lt;br /&gt;
&lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
What enterprises should look for in an encryption key manager&lt;br /&gt;
&lt;br /&gt;
The importance of standards (FIPS 140-2, PCI DSS validation, etc.)&lt;br /&gt;
&lt;br /&gt;
Meeting data security compliance (PCI DSS, GDPR, HIPAA, etc.) requirements with encryption key management&lt;br /&gt;
&lt;br /&gt;
KMS (Key Management Server) vs. KMS (Key Management Service)</description>
            <link>https://downloads.townsendsecurity.com/podcast/2019/012119-FIPS.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2019/012119-FIPS.mp3" length="22627332" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">1179ED85-046B-4734-B251-DFE8EA84BB0B-74119-00017C9269D208A7-FFA</guid>
            <pubDate>Mon, 21 Jan 2019 16:01:05 -0800</pubDate>
            <itunes:subtitle>Encryption key management has attained “essential infrastructure” status. When done properly, key management can protect encrypted data - and in the event of a data breach, can even provide a company with an exemption for a breach notification.</itunes:subtitle>
            <itunes:summary>Over the last several years, encryption key management has attained “essential infrastructure” status. When done properly, key management can protect encrypted data - and in the event of a data breach, can even provide a company with an exemption for a breach notification.

Download this podcast to learn about:

- What enterprises should look for in an encryption key manager

- The importance of standards (FIPS 140-2, PCI DSS validation, etc.)

- Meeting data security compliance (PCI DSS, GDPR, HIPAA, etc.) requirements with encryption key management

- KMS (Key Management Server) vs. KMS (Key Management Service)</itunes:summary>
            <itunes:duration>22:48</itunes:duration>
            <itunes:keywords>Encryption, Key Management, FIPS 140-2, Data Security, Enterprise Security, Compliance, Standards</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Protecting Data with vSphere &amp; vSAN Encryption</title>
            <description>VMware virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained within a traditional IT data center world. With vSphere version 6.5 and vSAN version 6.6 VMware customers now have the ability to encrypt VMware managed virtual machines and virtual disk.&lt;br /&gt;
&lt;br /&gt;
Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware with encryption and key management.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
vSphere and vSAN encryption&lt;br /&gt;
&lt;br /&gt;
Deploying multiple, redundant key servers as a part of the KMS Cluster configuration&lt;br /&gt;
&lt;br /&gt;
Meeting compliance regulations and security best practices (PCI DSS, GDPR, etc.)</description>
            <link>https://downloads.townsendsecurity.com/podcast/2018/092018-vSphere.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2018/092018-vSphere.mp3" length="16968026" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">28AF5996-93A7-4997-8761-ACCD1E3A7534-71634-000E782A8096E990-FFA</guid>
            <pubDate>Thu, 20 Sep 2018 16:12:03 -0700</pubDate>
            <itunes:subtitle>Learn about vSphere and vSAN encryption, deploying multiple, redundant key servers as a part of the KMS Cluster configuration for maximum resilience and high availability, as well as meeting compliance regulations for your organization.</itunes:subtitle>
            <itunes:summary>VMware virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained within a traditional IT data center world. With vSphere version 6.5 and vSAN version 6.6 VMware customers now have the ability to encrypt VMware managed virtual machines and virtual disk.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware with encryption and key management.

 
Download this podcast to learn about:
- vSphere and vSAN encryption
- Deploying multiple, redundant key servers as a part of the KMS Cluster configuration
- Meeting compliance regulations and security best practices (PCI DSS, GDPR, etc.)</itunes:summary>
            <itunes:duration>16:55</itunes:duration>
            <itunes:keywords>VMware, vSphere, vSAN, Encryption, Key Management, Data Security, Compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>GDPR, Encryption, &amp; Right of Erasure</title>
            <description><![CDATA[The European General Data Protection Regulation (GDPR) is radically transforming the information technology space. Organizations of all sizes and types, and cloud service providers large and small, must adjust to the notion that people now fully own information about themselves.<br />
<br />
Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to use encryption and key management to help meet GDPR, the right of erasure, also known as the right to be forgotten, and how to avoid bad key management practices which will result in GDPR compliance failures.<br />
 <br />
Download this podcast to learn about:
<ul><li>
Data security requirements of GDPR</li>
<li>
Right of erasure (also known as "the right to be forgotten")</li>
<li>
Meeting GDPR with encryption and key management</li>
<li>
The importance of standards and best practices</li></ul>]]></description>
            <link>https://downloads.townsendsecurity.com/podcast/2018/032918-GDPR.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2018/032918-GDPR.mp3" length="21920963" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">8A3ADC3F-25E9-42BD-A8FF-B3682F8EC6A1-75524-00006D56EA3C182C-FFA</guid>
            <pubDate>Thu, 29 Mar 2018 15:59:29 -0700</pubDate>
            <itunes:subtitle>Learn about how to use encryption and key management to help meet GDPR, the right of erasure, also known as the right to be forgotten, and how to avoid bad key management practices which will result in GDPR compliance failures.</itunes:subtitle>
            <itunes:summary>The European General Data Protection Regulation (GDPR) is radically transforming the information technology space. Organizations of all sizes and types, and cloud service providers large and small, must adjust to the notion that people now fully own information about themselves.

Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to use encryption and key management to help meet GDPR, the right of erasure, also known as the right to be forgotten, and how to avoid bad key management practices which will result in GDPR compliance failures.
 
Download this podcast to learn about:
- Data security requirements of GDPR
- Right of erasure (also known as &quot;the right to be forgotten&quot;)
- Meeting GDPR with encryption and key management
- The importance of standards and best practices</itunes:summary>
            <itunes:duration>22:44</itunes:duration>
            <itunes:keywords>GDPR, Compliance, Erasure, Forgotten, Encryption, Key Management, Cyber, Security, EU</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>IBM i, Two Factor Authentication, and PCI DSS</title>
            <description><![CDATA[PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have.  For IBM i users, this usually means a password and an authentication code provided to a token or mobile device.  However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become a deprecated method.<br />
 <br />
Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements.<br />
<ul><li>
Download this podcast to learn about:</li>
<li>PCI DSS and NIST requirements for two factor authentication</li>
<li>
Protecting critical data on the IBM i with two factor authentication</li>
<li>
Mobile based authentication with Twilio's Authy</li>
<li>Introduction to Alliance Two Factor Authentication</li></ul>]]></description>
            <link>https://downloads.townsendsecurity.com/podcast/2018/021618-2FA.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2018/021618-2FA.mp3" length="15406198" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">9839EF52-4718-4A9E-81B7-B674D34603BB-52588-00005B5DB5C88CA9-FFA</guid>
            <pubDate>Fri, 16 Feb 2018 10:39:24 -0800</pubDate>
            <itunes:subtitle>Join Patrick Townsend as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements.</itunes:subtitle>
            <itunes:summary>PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have.  For IBM i users, this usually means a password and an authentication code provided to a token or mobile device.  However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become a deprecated method.
 
Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements.
 
Download this podcast to learn about:
- PCI DSS and NIST requirements for two factor authentication

- Protecting critical data on the IBM i with two factor authentication

- Mobile based authentication with Twilio's Authy

- Introduction to Alliance Two Factor Authentication
</itunes:summary>
            <itunes:duration>15:57</itunes:duration>
            <itunes:keywords>IBM i, multifactor, two, factor, authentication, compliance, ibm i, iseries, as400, system i</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Big Data, MongoDB, &amp; Encryption</title>
            <description><![CDATA[It is difficult to say big data without instantly thinking about MongoDB. As enterprises adopt MongoDB, they also bring security concerns with them. Depending on their business, they may have multiple government (HIPAA, GDPR, FFIEC, etc.) or business (PCI DSS, etc) security regulatory standards with which they need to comply.<br />
 <br />
Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about leveraging the WiredTiger storage engine, achieving a strong security posture with key management, and how to easily begin encrypting data in MongoDB Enterprise. <br />
 <br />
Download this podcast to learn about:<br /><br />
<ul><li>
Encryption using the WiredTiger storage engine - no need to buy 3rd party encryption!</li>
<li>
Easily generate a master encryption key and begin encrypting database keys using native command line operations</li>
<li>
Meeting compliance requirements (PCI DSS, HIPAA, GDPR, etc.)</li>
<li>
The importance of KMIP</ul>]]></description>
            <link>https://downloads.townsendsecurity.com/podcast/2018/012318-mongodb.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2018/012318-mongodb.mp3" length="27808640" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">0ACAF4D0-D244-488E-97A1-C9ACF39B2BD6-70531-0000B371FF3C4F79-FFA</guid>
            <pubDate>Tue, 23 Jan 2018 10:13:47 -0800</pubDate>
            <itunes:subtitle>Learn about leveraging the WiredTiger storage engine, achieving a strong security posture with key management, and how to easily begin encrypting data in MongoDB Enterprise.</itunes:subtitle>
            <itunes:summary>It is difficult to say big data without instantly thinking about MongoDB. As enterprises adopt MongoDB, they also bring security concerns with them. Depending on their business, they may have multiple government (HIPAA, GDPR, FFIEC, etc.) or business (PCI DSS, etc) security regulatory standards with which they need to comply.
 
Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about leveraging the WiredTiger storage engine, achieving a strong security posture with key management, and how to easily begin encrypting data in MongoDB Enterprise. 
 
Download this podcast to learn about:
- Encryption using the WiredTiger storage engine - no need to buy 3rd party encryption!

- Easily generate a master encryption key and begin encrypting database keys using native command line operations

- Meeting compliance requirements (PCI DSS, HIPAA, GDPR, etc.)

- The importance of KMIP</itunes:summary>
            <itunes:duration>19:15</itunes:duration>
            <itunes:keywords>Encryption, Key Management, MongoDB, Security, Data Security, Compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Securing the IBM i in the Cloud</title>
            <description>While the IBM i (AS/400) is considered by many to be a secure platform, it is not immune to data breaches. For this special podcast, Clayton Weise of KeyInfo joins us to discuss running the IBM i in the cloud, maintaining a strong security posture, and common questions about cloud/on-prem hybrid networks. &lt;br /&gt;
 &lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
IBM i, security, and why customers are moving to the cloud&lt;br /&gt;
&lt;br /&gt;
Improving IBM i security posture by moving to cloud&lt;br /&gt;
&lt;br /&gt;
Meeting compliance requirements in the cloud&lt;br /&gt;
&lt;br /&gt;
Future proofing your IBM i platform</description>
            <link>https://downloads.townsendsecurity.com/podcast/2017/081117-KeyInfo.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2017/081117-KeyInfo.mp3" length="27091985" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E5A8725B-0A18-4EA5-9D19-0713344EF82A-31196-00015EF099C35DAB-FFA</guid>
            <pubDate>Fri, 11 Aug 2017 08:12:55 -0700</pubDate>
            <itunes:subtitle>For this special podcast, Clayton Weise of KeyInfo joins us to discuss running the IBM i in the cloud, maintaining a strong security posture, and common questions about cloud/on-prem hybrid networks.</itunes:subtitle>
            <itunes:summary>While the IBM i (AS/400) is considered by many to be a secure platform, it is not immune to data breaches. For this special podcast, Clayton Weise of KeyInfo joins us to discuss running the IBM i in the cloud, maintaining a strong security posture, and common questions about cloud/on-prem hybrid networks. 

Download this podcast to learn about:
- IBM i, security, and why customers are moving to the cloud
- Improving IBM i security posture by moving to cloud
- Meeting compliance requirements in the cloud
- Future proofing your IBM i platform</itunes:summary>
            <itunes:duration>28:07</itunes:duration>
            <itunes:keywords>IBM i, AS400, cloud, modernization, security, data, cybersecurity, iseries, encryption, file, transfer, KeyInfo</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Identify Escalated Privilege Attacks on IBM i</title>
            <description>Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server. &lt;br /&gt;
 &lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
Identifying escalated privilege attacks on the IBM i&lt;br /&gt;
&lt;br /&gt;
Determining the true level of authority of a user profile&lt;br /&gt;
&lt;br /&gt;
Controlling and monitoring administrative level users&lt;br /&gt;
&lt;br /&gt;
Setting email alerts to include critical job and security information</description>
            <link>https://downloads.townsendsecurity.com/podcast/2017/062617-identify-escalated-attacks.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2017/062617-identify-escalated-attacks.mp3" length="15955162" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">F9AA0A3B-4764-4279-BD2B-7D3D51A0C379-49476-0000202561FDB605-FFA</guid>
            <pubDate>Tue, 27 Jun 2017 08:25:44 -0700</pubDate>
            <itunes:subtitle>Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials.</itunes:subtitle>
            <itunes:summary>Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server. 
 
Download this podcast to learn about:
- Identifying escalated privilege attacks on the IBM i
- Determining the true level of authority of a user profile
- Controlling and monitoring administrative level users
- Setting email alerts to include critical job and security information</itunes:summary>
            <itunes:duration>16:21</itunes:duration>
            <itunes:keywords>IBM i, AS400, iSeries, Logging, Event, Monitoring, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Why Encryption is Critical to Fintech</title>
            <description>The financial world is rapidly changing.  Innovations in technology are impacting payments, lending, insurance, and even compliance. With huge amounts of private data being dealt with on a daily basis, data security is a top concern - and the best way to protect it is with encryption. &lt;br /&gt;
&lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
Encryption and key management&lt;br /&gt;
&lt;br /&gt;
Meeting the various compliance requirements&lt;br /&gt;
&lt;br /&gt;
Fintech in cloud environments&lt;br /&gt;
&lt;br /&gt;
Advice on selecting and evaluating a fintech vendor</description>
            <link>https://downloads.townsendsecurity.com/podcast/2017/061217-finance-encryption.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2017/061217-finance-encryption.mp3" length="10823268" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">0E56790A-0AB3-41B9-9B94-E34FA8A285CB-31423-00016353699FCD7D-FFA</guid>
            <pubDate>Mon, 12 Jun 2017 16:06:24 -0700</pubDate>
            <itunes:subtitle>Innovations in technology are impacting payments, lending, insurance, and even compliance. With huge amounts of private data being dealt with on a daily basis, data security is a top concern - and the best way to protect it is with encryption.</itunes:subtitle>
            <itunes:summary>The financial world is rapidly changing.  Innovations in technology are impacting payments, lending, insurance, and even compliance. With huge amounts of private data being dealt with on a daily basis, data security is a top concern - and the best way to protect it is with encryption. 

Download this podcast to learn about:
- Encryption and key management
- Meeting the various compliance requirements
- Fintech in cloud environments
- Advice on selecting and evaluating a fintech vendor</itunes:summary>
            <itunes:duration>22:00</itunes:duration>
            <itunes:keywords>fintech, finance, technology, compliance, encryption, cloud, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption Requirements for Banks &amp; Financial Services</title>
            <description><![CDATA[The finance industry is increasingly being held accountable for the security, confidentiality and integrity of non-public customer information.  By protecting nonpublic personal information (NPI) and personally identifiable information (PII), businesses in the banking and financial services industry can protect private information including: customer financial records, social security number, income, and account numbers.  Organizations that experience a data breach where un-encrypted data is lost can suffer fines reaching into the millions of dollars, as well as face indirect costs like brand damage and customer loss.<br />
 <br />
Download this podcast to learn about:<ul>
<li>Meeting data security compliance requirements (GLBA, FFIEC, PCI DSS, etc.)</li>
<li>
Examples of NPI and PII that need to be encrypted</li>
<li>
Encryption and key management</li>
<li>
How to take advantage of the GLBA’s “safe harbor” protection for privacy notices</li></ul>]]></description>
            <link>https://downloads.townsendsecurity.com/podcast/2017/033017_finance.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2017/033017_finance.mp3" length="8928220" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E6111E2A-7373-44BA-9758-9BDEDD9C93C8-72781-0001257463048186-FFA</guid>
            <pubDate>Thu, 30 Mar 2017 15:14:46 -0700</pubDate>
            <itunes:subtitle>The finance industry is increasingly being held accountable for the security, confidentiality and integrity of non-public customer information.</itunes:subtitle>
            <itunes:summary>The finance industry is increasingly being held accountable for the security, confidentiality and integrity of non-public customer information. By protecting nonpublic personal information (NPI) and personally identifiable information (PII), businesses in the banking and financial services industry can protect private information including: customer financial records, social security number, income, and account numbers. Organizations that experience a data breach where un-encrypted data is lost can suffer fines reaching into the millions of dollars, as well as face indirect costs like brand damage and customer loss. Download this podcast to learn about: - Meeting data security compliance requirements (GLBA, FFIEC, PCI DSS, etc.) - Examples of NPI and PII that need to be encrypted - Encryption and key management - How to take advantage of the GLBA’s “safe harbor” protection for privacy notices</itunes:summary>
            <itunes:duration>18:03</itunes:duration>
            <itunes:keywords>encryption, data, security, compliance, key, management, glba, ffiec, pci, compliance, npi, pii</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>HIPAA Compliance, Business Associates, and Data Security</title>
            <description>As Covered Entities take electronic Protected Health Information (ePHI) move to the cloud, they need to understand the important role of having a Business Associate Agreement (BAA) in place and how to ensure that they are meeting HIPAA compliance when ePHI is outside of their walls.&lt;br /&gt;
 &lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
What is considered electronic Protected Health Information (ePHI)&lt;br /&gt;
&lt;br /&gt;
The role of Business Associates (BA) as defined by the Department of Health and Human Services&lt;br /&gt;
&lt;br /&gt;
Storing ePHI in the Cloud and meeting HIPAA compliance&lt;br /&gt;
&lt;br /&gt;
Key takeaways that vendors can implement today for improved security</description>
            <link>https://downloads.townsendsecurity.com/podcast/2017/021617-HIPAA-BAA.mp3</link>
            <enclosure url="https://downloads.townsendsecurity.com/podcast/2017/021617-HIPAA-BAA.mp3" length="10531725" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">1A86DE28-C6CA-4951-84FB-B621AC932C4C-75619-0000DC07A5886D2D-FFA</guid>
            <pubDate>Fri, 17 Feb 2017 07:46:13 -0800</pubDate>
            <itunes:subtitle>As Covered Entities who take ePHI move to the cloud, they need to understand the important role of having a Business Associate Agreement (BAA) in place and how to ensure that they are meeting HIPAA compliance when ePHI is outside of their walls.</itunes:subtitle>
            <itunes:summary>As Covered Entities take electronic Protected Health Information (ePHI) move to the cloud, they need to understand the important role of having a Business Associate Agreement (BAA) in place and how to ensure that they are meeting HIPAA compliance when ePHI is outside of their walls.
 
Download this podcast to learn about:
- What is considered electronic Protected Health Information (ePHI)

- The role of Business Associates (BA) as defined by the Department of Health and Human Services

- Storing ePHI in the Cloud and meeting HIPAA compliance

- Key takeaways that vendors can implement today for improved security</itunes:summary>
            <itunes:duration>21:24</itunes:duration>
            <itunes:keywords>ephi, hipaa, compliance, data, security, encryption, business, associate, csp, phi</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>The Future of Security Logging on the IBM i</title>
            <description>Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs.  With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events.&lt;br /&gt;
 &lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
&lt;br /&gt;
    Current status of security logging on the IBM i&lt;br /&gt;
&lt;br /&gt;
    The future of log collection and monitoring&lt;br /&gt;
&lt;br /&gt;
    New logging sources in IBM i V7R3&lt;br /&gt;
&lt;br /&gt;
    Elements of an effective active monitoring strategy</description>
            <link>http://downloads.townsendsecurity.com/podcast/2017/011017-Logging.mp3</link>
            <enclosure url="http://downloads.townsendsecurity.com/podcast/2017/011017-Logging.mp3" length="13023842" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">EB2CFCC6-2232-412A-83F2-A3281F8E6BA9-75093-00016481E0893615-FFA</guid>
            <pubDate>Tue, 10 Jan 2017 09:41:55 -0800</pubDate>
            <itunes:subtitle>As the IBM i continues to evolve, so do sources of security logs.  With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events.</itunes:subtitle>
            <itunes:summary>Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs.  With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events.
 
Download this podcast to learn about:
- Current status of security logging on the IBM i
- The future of log collection and monitoring
- New logging sources in IBM i V7R3
- Elements of an effective active monitoring strategy</itunes:summary>
            <itunes:duration>26:35</itunes:duration>
            <itunes:keywords>security, logging, monitoring, log, ibm, as400, iseries, compliance, event, file, integrity</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>IBM i 7.3 Security: New Logs to Collect and Monitor</title>
            <description>Active monitoring (sometimes referred to as Continuous Monitoring) is a critical security control for all organizations and is one of the most effective security controls you can deploy. The large majority of security breaches occur on systems that have been compromised days, weeks, or even months before sensitive data is lost. With the release of V7R3, IBM i administrators have additional security logs to collect and monitor.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Download this podcast to learn about:&lt;br /&gt;
Log collection and monitoring on the IBM i&lt;br /&gt;
&lt;br /&gt;
New logging sources in IBM i V7R3&lt;br /&gt;
&lt;br /&gt;
System log formats and standards&lt;br /&gt;
&lt;br /&gt;
Elements of an effective active monitoring strategy</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2016/101716-logging.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2016/101716-logging.mp3" length="8886427" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">1AF8DDFF-666B-4E32-AC91-649EDFF90E90-6733-00003D372EA938DC-FFA</guid>
            <pubDate>Mon, 17 Oct 2016 13:23:15 -0700</pubDate>
            <itunes:subtitle>The large majority of security breaches occur on systems that have been compromised days, weeks, or even months before sensitive data is lost. With the release of V7R3, IBM i administrators have additional security logs to collect and monitor.</itunes:subtitle>
            <itunes:summary>Active monitoring (sometimes referred to as Continuous Monitoring) is a critical security control for all organizations and is one of the most effective security controls you can deploy. The large majority of security breaches occur on systems that have been compromised days, weeks, or even months before sensitive data is lost. With the release of V7R3, IBM i administrators have additional security logs to collect and monitor.
 
Download this podcast to learn about:
- Log collection and monitoring on the IBM i
- New logging sources in IBM i V7R3
- System log formats and standards
- Elements of an effective active monitoring strategy</itunes:summary>
            <itunes:duration>17:57</itunes:duration>
            <itunes:keywords>security, log, event, monitoring, IBM i, AS400, iSeries, compliance, real-time</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Protecting Enceryption Keys in AWS</title>
            <description><![CDATA[Once data is encrypted, private information depends on key management to stay safe. As enterprises move to the cloud, it is important for key management solutions to provide high-availability, centralized key management to a wide range of applications and databases.<br />
 <ul><li>
Download this podcast to learn about:</li>
<li>Encryption key management options in AWS (Key Management Service, Cloud HSM, third-party options)</li>
<li>
The different approaches to managing encryption keys<br />
</li>
<li>Resources available to developers and managed service providers (MSPs)</li>
<li>
How Townsend Security is helping AWS customers protect their encryption keys with centralized key management</li></ul>]]></description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2016/080816-AWS.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2016/080816-AWS.mp3" length="10889805" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">4F11854F-AF82-47B3-B259-7406760EE37F-16753-000083E5893ECBFD-FFA</guid>
            <pubDate>Tue, 09 Aug 2016 11:42:10 -0700</pubDate>
            <itunes:subtitle>Once data is encrypted, private information depends on key management to stay safe. As enterprises move to the cloud, it is important for key management solutions to provide high-availability, key management to a wide range of applications and databases.</itunes:subtitle>
            <itunes:summary>Once data is encrypted, private information depends on key management to stay safe. As enterprises move to the cloud, it is important for key management solutions to provide high-availability, centralized key management to a wide range of applications and databases.

Download this podcast to learn about:
- Encryption key management options in AWS (Key Management Service, Cloud HSM, third-party options)

- The different approaches to managing encryption keys

- Resources available to developers and managed service providers (MSPs)

- How Townsend Security is helping AWS customers protect their encryption keys with centralized key management</itunes:summary>
            <itunes:duration>22:08</itunes:duration>
            <itunes:keywords>Encryption, Key, Management, AWS, Cloud, HSM, Service, Compliance, Data, Security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encrypting Data in IBM SoftLayer</title>
            <description><![CDATA[VMware and IBM's recent partnership lets customers migrate workloads back and forth between VMware-based private clouds and IBM SoftLayer.  Join Patrick Townsend as he discusses what this partnership means (from a security perspective), compliance considerations, and how organizations can better secure their data in IBM SoftLayer.<br />
 <br />
Download this podcast to learn about:<ul><li>
Migrating your organization's VMware infrastructure to the cloud</li>
<li>
What the IBM/VMware partnership means to end users<br />
</li>
<li>Challenges IBM i customers are facing regarding multi-factor authentication</li>
<li>
How Townsend Security is helping VMware users move to the cloud</li></ul>]]></description>
            <link>http://townsendsecurity.com/downloads/podcast/2016/060916-SoftLayer.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2016/060916-SoftLayer.mp3" length="24365621" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">6922BB89-15D4-4DF9-8057-AE27256B268B-32905-000012E46928128B-FFA</guid>
            <pubDate>Thu, 09 Jun 2016 15:51:34 -0700</pubDate>
            <itunes:subtitle>Join Patrick Townsend as he discusses what this partnership means (from a security perspective), compliance considerations, and how organizations can better secure their data in IBM SoftLayer.</itunes:subtitle>
            <itunes:summary>VMware and IBM's recent partnership lets customers migrate workloads back and forth between VMware-based private clouds and IBM SoftLayer.  Join Patrick Townsend as he discusses what this partnership means (from a security perspective), compliance considerations, and how organizations can better secure their data in IBM SoftLayer.
 
Download this podcast to learn about:
- Migrating your organization's VMware infrastructure to the cloud

- What the IBM/VMware partnership means to end users

- Challenges IBM i customers are facing regarding multi-factor authentication

- How Townsend Security is helping VMware users move to the cloud</itunes:summary>
            <itunes:duration>16:51</itunes:duration>
            <itunes:keywords>encryption, key, management, compliance, IBM, SoftLayer, VMware, vCloud, cloud, security, private, public</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>IBM i, PCI DSS 3.2, and Multi-Factor Authentication</title>
            <description><![CDATA[Prior to version 3.2 of the PCI Data Security Standard (PCI DSS), remote users were required to use multi-factor authentication for access to all systems processing, transmitting, or storing credit card data. With version 3.2, this is now extended to include ALL local users performing administrative functions in the cardholder data environment (CDE).<br />
 <br />
Download this podcast to learn about:<ul><li>
What PCI DSS 3.2 means for IBM i administrators</li>
<li>
Why it is harder to identifiy an administrative user on the IBM i</li>
<li>
Challenges IBM i customers are facing regarding multi-factor authentication</li>
<li>
How Townsend Security is helping organizations meet PCI DSS 3.2 with multi-factor authentication</li><ul>]]></description>
            <link>http://http://townsendsecurity.com/downloads/podcast/2016/060116-2FA-PCI.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2016/060116-2FA-PCI.mp3" length="27646382" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">CB1859FD-F67A-4C6F-8EC1-088BC44087C4-75525-0001E4AF149FFD00-FFA</guid>
            <pubDate>Wed, 01 Jun 2016 16:00:11 -0700</pubDate>
            <itunes:subtitle>Patrick Townsend discusses PCI DSS 3.2, what it means for IBM i users, and what IBM i administrators can do to meet the latest multi-factor authentication requirements of PCI DSS.</itunes:subtitle>
            <itunes:summary>Prior to version 3.2 of the PCI Data Security Standard (PCI DSS), remote users were required to use multi-factor authentication for access to all systems processing, transmitting, or storing credit card data. With version 3.2, this is now extended to include ALL local users performing administrative functions in the cardholder data environment (CDE).
 
Download this podcast to learn about:
- What PCI DSS 3.2 means for IBM i administrators
- Why it is harder to identify an administrative user on the IBM i
- Challenges IBM i customers are facing regarding multi-factor authentication
- How Townsend Security is helping organizations meet PCI DSS 3.2 with multi-factor authentication</itunes:summary>
            <itunes:duration>19:08</itunes:duration>
            <itunes:keywords>pci, two, factor, authentication, multi-factor, multifactor, compliance, ibm i, iseries, system i, as400, cde,</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>FIELDPROC Encryption with Legacy RPG Applications on IBM i</title>
            <description>While the IBM DB2 Field Procedures (FieldProc) facility works quite well with native SQL applications, IBM i customers with legacy RPG applications have not been able to take full advantage of FieldProc to encrypt data in DB2 tables. In particular, the encryption of database columns, which are indexes, has been very difficult for IBM i customers using legacy RPG. This results with inability to use FieldProc encryption to protect sensitive data. &lt;br /&gt;
 &lt;br /&gt;
Download this podcast to learn about:&lt;ul&gt;&lt;li&gt;
How IBM i customers with legacy RPG applications can deploy automatic DB2 encryption over sensitive data which are indexes&lt;/li&gt;
&lt;li&gt;
How to leverage OAR capabilities to replace the legacy RPG file I/O with modern SQL operations&lt;/li&gt;
&lt;li&gt;
What industries will benefit the most&lt;/li&gt;&lt;ul&gt;</description>
            <link>http://townsendsecurity.com/downloads/podcast/2016/052316-OAR.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2016/052316-OAR.mp3" length="24244730" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">DE1D1D40-8965-4972-BF0F-A8F30E03CE85-23669-0001E9FC169EBB84-FFA</guid>
            <pubDate>Mon, 23 May 2016 15:53:56 -0700</pubDate>
            <itunes:subtitle>While the IBM i FIELDPROC facility works quite well with native SQL applications, customers with legacy RPG applications have not been able to take full advantage of FieldProc to encrypt data in DB2 tables.</itunes:subtitle>
            <itunes:summary>While the IBM DB2 Field Procedures (FieldProc) facility works quite well with native SQL applications, IBM i customers with legacy RPG applications have not been able to take full advantage of FieldProc to encrypt data in DB2 tables. In particular, the encryption of database columns, which are indexes, has been very difficult for IBM i customers using legacy RPG. This results with inability to use FieldProc encryption to protect sensitive data. 
 
Download this podcast to learn about:
- How IBM i customers with legacy RPG applications can deploy automatic DB2 encryption over sensitive data which are indexes

- How to leverage OAR capabilities to replace the legacy RPG file I/O with modern SQL operations

- What industries will benefit the most</itunes:summary>
            <itunes:duration>16:46</itunes:duration>
            <itunes:keywords>oar, encryption, fieldproc, ibm i, as400, iseries, rpg, sql, DB2, modernization, indexes</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Securing Data in MongoDB</title>
            <description><![CDATA[Encryption of data at rest, along with good security policies, can help businesses meet compliance regulations like PCI DSS and HIPAA, safeguard enterprise IP, and protect customer PII.  While MongoDB provides a mechanism to encrypt data, it is still up to the users to manage encryption keys.<br />
 <br />
Download this podcast to learn about:<ul><li>
When MongoDB users would need to deploy encryption and key management</li>
<li>
Encryption and key management best practices for MongoDB users</li>
<li>
How MongoDB fits into the larger set of open source and commercial databases</li>
<li>
The importance of KMIP</li></ul>]]></description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2016/041516-MongoDB.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2016/041516-MongoDB.mp3" length="27637389" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">85C49351-3E80-4816-8C73-C15B137CBE64-44110-0000D7B39F9E84F5-FFA</guid>
            <pubDate>Fri, 06 May 2016 11:42:51 -0700</pubDate>
            <itunes:subtitle>While MongoDB provides a mechanism to encrypt data, it is still up to the users to manage encryption keys. Learn key management best practices.</itunes:subtitle>
            <itunes:summary>Encryption of data at rest, along with good security policies, can help businesses meet compliance regulations like PCI DSS and HIPAA, safeguard enterprise IP, and protect customer PII.  While MongoDB provides a mechanism to encrypt data, it is still up to the users to manage encryption keys.
 
Download this podcast to learn about:
- When MongoDB users would need to deploy encryption and key management

- Encryption and key management best practices for MongoDB users

- How MongoDB fits into the larger set of open source and commercial databases

- The importance of KMIP</itunes:summary>
            <itunes:duration>18:41</itunes:duration>
            <itunes:keywords>MongoDB, encryption, key, management, security, data, KMIP, compliance, PCI DSS, HIPAA, PII</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>HIPAA, HITRUST, Security, and their Relationships</title>
            <description><![CDATA[HIPAA requires covered organizations to implement technical safeguards to protect all electronic personal healthcare information (ePHI), making specific reference to encryption, access controls, encryption key management, risk management, auditing, and monitoring of ePHI information. By knowing the relationship of HIPAA and HITRUST, covered entities and business associates can better understand their requirements for protecting ePHI.<br />
 <br />
Download this podcast to learn about:<br />
<ul><li>The difference between HIPAA and HITRUST</li>
<li>
The difference between meeting compliance and managing security risk</li>
<li>
Protecting ePHI with encryption and key management</li>
<li>
How Townsend Security is helping covered entities protect ePHI </li></ul>]]></description>
            <link>http://townsendsecurity.com/downloads/podcast/2016/041116-HIPAA-HITRUST.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2016/041116-HIPAA-HITRUST.mp3" length="29650703" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">8D211B44-6B20-446E-B636-5636C5CF5EFD-30040-00001147CB0E19C0-FFA</guid>
            <pubDate>Mon, 11 Apr 2016 13:37:02 -0700</pubDate>
            <itunes:subtitle>HIPAA requires covered organizations to implement technical safeguards to protect all ePHI, making specific reference to encryption, encryption key management, and monitoring of ePHI information. Download podcast to learn more.</itunes:subtitle>
            <itunes:summary>HIPAA requires covered organizations to implement technical safeguards to protect all electronic personal healthcare information (ePHI), making specific reference to encryption, access controls, encryption key management, risk management, auditing, and monitoring of ePHI information. By knowing the relationship of HIPAA and HITRUST, covered entities and business associates can better understand their requirements for protecting ePHI.
</itunes:summary>
            <itunes:duration>20:32</itunes:duration>
            <itunes:keywords>hipaa, hitrust, security, compliance, data, privacy, encryption, key, managment, data, breach</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Defending Data on Linux</title>
            <description><![CDATA[While Linux has a reputation as being secure, it is not immune to a data breach.  Security administrators and application developers need to take a data-centric approach to protecting their private information – such as their employee data, intellectual property (IP), or customers’ PII.  Without the proper controls in place, business applications and information are at risk.  This podcast discusses:<br />
<br />
<ul><li>How developers can better secure their applications</li>
<li>Choosing an encryption algorithm</li>
<li>Encryption key management</li>
<li>Resources for more information</li></ul>
]]></description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2016/032816-Linux.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2016/032816-Linux.mp3" length="12075870" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">F568AE4C-70D7-472C-B68B-A66A93560322-16592-0002818E3EB0DE3B-FFA</guid>
            <pubDate>Mon, 28 Mar 2016 16:13:00 -0700</pubDate>
            <itunes:subtitle>While Linux has a reputation as being secure, it is not immune to a data breach.  Without the proper controls in place, business applications and information are at risk.</itunes:subtitle>
            <itunes:summary>While Linux has a reputation as being secure, it is not immune to a data breach.  Security administrators and application developers need to take a data-centric approach to protecting their private information – such as their employee data, intellectual property (IP), or customers’ PII.  Without the proper controls in place, business applications and information are at risk.  This podcast discusses:

•	How developers can better secure their applications
•	Choosing an encryption algorithm
•	Encryption key management
•	Resources for more information
</itunes:summary>
            <itunes:duration>16:24</itunes:duration>
            <itunes:keywords>encryption, key, management, linux, data, security, developers, compliance, application, resources, standards, AES</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Compliance for Coders - Securing Sensitive Data</title>
            <description><![CDATA[As compliance regulations evolve, developers are finding themselves tasked with modifying existing applications to implement new, better security, as well as creating new applications that need to follow security best practices.<br />
<br />
Listen to this podcast to learn about:<br />
<ul><li>Meeting compliance requirements</li><br />
<li>Writing code with a security perspective</li><br />
<li>Encrypting data</li><ul><br />
]]></description>
            <link>http://townsendsecurity.com/downloads/podcast/2016/020216-compliance-coders.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2016/020216-compliance-coders.mp3" length="14353726" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">7FA006B0-AB4C-4906-8E15-D747607FE2B0-86517-00007DBB88848621-FFA</guid>
            <pubDate>Tue, 02 Feb 2016 08:45:23 -0800</pubDate>
            <itunes:subtitle>As compliance regulations evolve, developers are finding themselves tasked with modifying existing applications to implement new, better security, as well as creating new applications that need to follow security best practices.</itunes:subtitle>
            <itunes:summary>As compliance regulations evolve, developers are finding themselves tasked with modifying existing applications to implement new, better security, as well as creating new applications that need to follow security best practices.

Listen to this podcast to learn about:
• Meeting compliance requirements
• Writing code with a security perspective
• Encrypting data
</itunes:summary>
            <itunes:duration>9:48</itunes:duration>
            <itunes:keywords>encryption, key, management, compliance, code, cloud, VMware, programming, PCI DSS</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Monitoring IBM i Security Logs with IBM QRadar</title>
            <description><![CDATA[Collecting real-time security events on the IBM i platform is different than other platforms - logs are stored in many different places in a proprietary IBM format.  This presents a challenge for administrators who need to monitor their IBM i logs.<br />
 <br />
Download this podcast to learn about:<br />
<ul><li>Real-time security event logging on the IBM i</li>
<li>Monitoring your most critical data with IBM Security QRadar</li>
<li>
Meeting compliance requirements like PCI DSS, HIPAA, FFIEC, and more</li><ul>]]></description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2015/10272015-QRadar.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2015/10272015-QRadar.mp3" length="13382591" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">5BC0002A-1BAE-45C3-BED9-6C5A8BEBF190-52407-0000EA34FA2F2D11-FFA</guid>
            <pubDate>Wed, 28 Oct 2015 15:10:47 -0700</pubDate>
            <itunes:subtitle>Collecting real-time security events on the IBM i platform is different than other platforms - logs are stored in many different places in a proprietary IBM format.  This presents a challenge for administrators who need to monitor their IBM i logs.</itunes:subtitle>
            <itunes:summary>Collecting real-time security events on the IBM i platform is different than other platforms - logs are stored in many different places in a proprietary IBM format.  This presents a challenge for administrators who need to monitor their IBM i logs.
 
Download this podcast to learn about:
- Real-time security event logging on the IBM i
- Monitoring your most critical data with IBM Security QRadar
- Meeting compliance requirements like PCI DSS, HIPAA, FFIEC, and more</itunes:summary>
            <itunes:duration>18:27</itunes:duration>
            <itunes:keywords>IBM, QRadar, Security, Log, Monitoring, system, loogging, IBM i, AS400, iseries, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>How Secure is Encrypted Data in the Cloud?</title>
            <description><![CDATA[As cloud storage becomes commonplace, the need to protect and encrypt data grows more important than ever.  The critical question becomes, who has access to your encryption keys? Download this podcast to learn about:<br />
 <br /><br />
Download this 20-minute podcast to learn more about:<br />
<ul><li>
<li>Encrypting data in the cloud</li>
<li>Why encrypted data in the cloud may not be as secure as you'd think</li>
<li>Special considerations for managing encryption keys in the cloud</li></ul>]]></description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2015/032315-cloud-encryption.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2015/032315-cloud-encryption.mp3" length="16472592" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">86769B2B-AF78-4B00-B14E-86A525C214C6-87945-0000A83C6C4719CA-FFA</guid>
            <pubDate>Tue, 24 Mar 2015 10:11:04 -0700</pubDate>
            <itunes:subtitle>As cloud storage becomes commonplace, the need to protect and encrypt data grows more important than ever.  The critical question becomes, who has access to your encryption keys?</itunes:subtitle>
            <itunes:summary>As cloud storage becomes commonplace, the need to protect and encrypt data grows more important than ever. The critical question becomes, who has access to your encryption keys? 
Download this podcast to learn about: Download this 20-minute podcast to learn more about:

• Encrypting data in the cloud
• Why encrypted data in the cloud may not be as secure as you'd think
• Special considerations for managing encryption keys in the cloud</itunes:summary>
            <itunes:duration>22:31</itunes:duration>
            <itunes:keywords>cloud, encryption, key, management, aws, microsoft, azure, compliance, CSP</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>VMware and SQL Server Encryption</title>
            <description>For SQL Server users in VMware environments, encryption and key management is easier than ever.  With a ready-to-deploy OVA formatted solutions, VMware customers can launch an encryption key manager with standard VMware tools and begin securing their sensitive data in SQL Server within minutes.&lt;br /&gt;
 &lt;br /&gt;
Download this 20-minute podcast to learn more about:&lt;br /&gt;
• Encrypting data on Microsoft SQL Server in VMware environments&lt;br /&gt;
• Using Transparent Data Encryption (TDE), Cell Level Encryption, and Extensible Key Management (EKM)&lt;br /&gt;
• Encrypting data in SQL Server Enterprise and Standard editions</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/120414-VMware-SQL.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/120414-VMware-SQL.mp3" length="14589897" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">DB55B849-1EF1-4D22-9AD2-CFAE35F555C1-249-0000005B8ACDE348-FFA</guid>
            <pubDate>Fri, 05 Dec 2014 10:18:48 -0800</pubDate>
            <itunes:subtitle>For SQL Server users in VMware environments, encryption is easier than ever.  With a ready-to-deploy OVA formatted solutions, users can launch an encryption key manager with standard VMware tools and begin securing their data in within minutes.</itunes:subtitle>
            <itunes:summary>For SQL Server users in VMware environments, encryption and key management is easier than ever.  With a ready-to-deploy OVA formatted solutions, VMware customers can launch an encryption key manager with standard VMware tools and begin securing their sensitive data in SQL Server within minutes.

Download this 20-minute podcast to learn more about:
• Encrypting data on Microsoft SQL Server in VMware environments
• Using Transparent Data Encryption (TDE), Cell Level Encryption, and Extensible Key Management (EKM)
• Encrypting data in SQL Server Enterprise and Standard editions</itunes:summary>
            <itunes:duration>19:54</itunes:duration>
            <itunes:keywords>encryption, key, management, sql, server, microsoft, tde, ekm, enterprise, data, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Protecting Data with Encryption in VMware</title>
            <description>Every business is trying to save money and reduce complexity in their IT departments, and many are accomplishing this today by using virtual machines such as VMware. While these business's infrastructures are becoming virtual, their security threats are still very much real.&lt;br /&gt;
 &lt;br /&gt;
Download this 20-minute podcast to learn more about:&lt;br /&gt;
• Encrypting data in VMware&lt;br /&gt;
• Encryption performance&lt;br /&gt;
• Special encryption and key management concerns for VMware users</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/120314-VMware.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/120314-VMware.mp3" length="14357930" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">181901AC-07E5-4A19-BF0E-5F3A82F28011-38139-0000A04B7F4D7281-FFA</guid>
            <pubDate>Fri, 05 Dec 2014 08:57:38 -0800</pubDate>
            <itunes:subtitle>Every business is trying to save money and reduce complexity, and many are accomplishing this by using VMware. While these business's infrastructures are becoming virtual, their security threats are still very much real.</itunes:subtitle>
            <itunes:summary>Every business is trying to save money and reduce complexity in their IT departments, and many are accomplishing this today by using virtual machines such as VMware. While these business's infrastructures are becoming virtual, their security threats are still very much real.

Download this 20-minute podcast to learn more about:
• Encrypting data in VMware
• Encryption performance
• Special encryption and key management concerns for VMware users</itunes:summary>
            <itunes:duration>19:35</itunes:duration>
            <itunes:keywords>encryption, key, management, vmware, virtualized, performance, compliance, risk, management, data, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption, Key Management, &amp; GRC</title>
            <description>Data breaches are no longer a matter of “if” but “when”.  When developing a data breach response plan it is important to consider the technologies you can implement to help mitigate a data breach, or prevent one from happening altogether.&lt;br /&gt;
 &lt;br /&gt;
Download this 10-minute podcast to learn more about:&lt;br /&gt;
* Managing risk by implementing the right technologies&lt;br /&gt;
* What executives can learn from the latest data breaches&lt;br /&gt;
* Asking the right data security questions&lt;br /&gt;
* Encryption in the cloud</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/102014-GRC.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/102014-GRC.mp3" length="9232709" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">171530D0-1FEE-4AF6-96CE-ED9F95E505EB-20293-000166A2A3441E64-FFA</guid>
            <pubDate>Mon, 20 Oct 2014 16:40:32 -0700</pubDate>
            <itunes:subtitle>Encryption, Key Management, &amp; GRC</itunes:subtitle>
            <itunes:summary>Data breaches are no longer a matter of “if” but “when”.  When developing a data breach response plan it is important to consider the technologies you can implement to help mitigate a data breach, or prevent one from happening altogether.

Download this 10-minute podcast to learn more about:
• Managing risk by implementing the right technologies
• What executives can learn from the latest data breaches
• Asking the right data security questions
• Encryption in the cloud</itunes:summary>
            <itunes:duration>12:28</itunes:duration>
            <itunes:keywords>encryption, key, management, grc, governance, risk, management, compliance, data, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption &amp; Key Management in Amazon Web Services (AWS)</title>
            <description><![CDATA[Amazon Web Services (AWS) is a deep and rich cloud platform supporting a wide variety of operating systems, services, and third-party applications.  What can enterprises do to make sure their data is protected?<br />
<ul>
<li>Download this 20-minute podcast to learn more about:</li>
<li>Protecting data in Amazon Web Services (AWS)</li>
<li>Securing data in RDS, S3, EBS, and DynamoDB</li>
<li>Strategies for deploying a key manager</li>
<li>Meeting compliance regulations</li></ul>]]></description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/092914-AWS-Encryption.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/092914-AWS-Encryption.mp3" length="15230048" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">6BA7BFFB-F882-4348-9012-1E444C243C6C-8211-00005A4E36C09BB7-FFA</guid>
            <pubDate>Mon, 29 Sep 2014 16:41:08 -0700</pubDate>
            <itunes:subtitle>Amazon Web Services (AWS) is a deep and rich cloud platform supporting a wide variety of operating systems, services, and third-party applications.  What can enterprises do to make sure their data is protected?</itunes:subtitle>
            <itunes:summary>Amazon Web Services (AWS) is a deep and rich cloud platform supporting a wide variety of operating systems, services, and third-party applications.  What can enterprises do to make sure their data is protected?
 
Download this 20-minute podcast to learn more about:
• Protecting data in Amazon Web Services (AWS)
• Securing data in RDS, S3, EBS, and DynamoDB
• Strategies for deploying a key manager
• Meeting compliance regulations</itunes:summary>
            <itunes:duration>20:47</itunes:duration>
            <itunes:keywords>encryption, key, management, compliance, amazon, web, services, AWS, data, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Virtualized Encryption &amp; Key Management with VMware</title>
            <description>Are there any special considerations for encryption and key management in VMware?  This podcast discusses overcoming the challenges of encryption in VMware.&lt;br /&gt;

Download this 15-minute podcast to learn more about:&lt;br /&gt;
&lt;br /&gt;
    • Encryption and key management with VMware&lt;br /&gt;
    • How to avoid the common &quot;gotchas&quot;&lt;br /&gt;
    • The importance of certified solutions</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/090814-VMware.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/090814-VMware.mp3" length="10328027" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">431EE4EB-9D58-4460-9035-CF88EB2A8BED-48678-0001D3E12FAFF9CA-FFA</guid>
            <pubDate>Mon, 08 Sep 2014 11:44:09 -0700</pubDate>
            <itunes:subtitle>Are there any special considerations for encryption and key management in VMware? This podcast discusses overcoming the challenges of encryption in VMware.</itunes:subtitle>
            <itunes:summary>Are there any special considerations for encryption and key management in VMware? This podcast discusses overcoming the challenges of encryption in VMware.</itunes:summary>
            <itunes:duration>13:59</itunes:duration>
            <itunes:keywords>VMware, encryption, key, management, data, security, compliance, challenges</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Fundamentals of Encryption in Drupal</title>
            <description>Developing secure websites in Drupal can be a challenge, especially when it comes to encrypting sensitive data and meeting compliance.

Download this 20-minute podcast to learn more about:
• Encrypting data in Drupal
• What data needs to be encrypted
• Encryption key management
• Townsend Security's Drupal Developer program</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/082614-Drupal-Developer.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/082614-Drupal-Developer.mp3" length="9549800" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">421A3A66-01BB-4D9B-88B6-2B898898F654-13126-000110CD42B7F799-FFA</guid>
            <pubDate>Tue, 26 Aug 2014 14:22:43 -0700</pubDate>
            <itunes:subtitle>Developing secure websites in Drupal can be a challenge, especially when it comes to encrypting sensitive data and meeting compliance.</itunes:subtitle>
            <itunes:summary>Developing secure websites in Drupal can be a challenge, especially when it comes to encrypting sensitive data and meeting compliance.

Download this 20-minute podcast to learn more about:
• Encrypting data in Drupal
• What data needs to be encrypted
• Encryption key management
• Townsend Security's Drupal Developer program</itunes:summary>
            <itunes:duration>12:56</itunes:duration>
            <itunes:keywords>encryption, key, management, drupal, developers, compliance, cms, community</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption &amp; Key Management in AWS</title>
            <description>While Amazon Web Services (AWS) delivers a secure, scalable cloud computing platform, organizations may be required to deploy an additional layer of security to protect the data they store in the cloud.&lt;br&gt;
&lt;br&gt;&lt;b&gt;
Download this 20-minute podcast to learn more about:&lt;/b&gt;&lt;br&gt;• Protecting data in Amazon Web Services (AWS)&lt;br&gt;• Best practices for deploying a key manager in the cloud&lt;br&gt;• Meeting compliance regulations&lt;br&gt;
&lt;br&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/041114-AWS.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/041114-AWS.mp3" length="16701482" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">DEAAB3B8-169C-455B-81EB-C5F6BA02159D-48442-0000D307FA669623-FFA</guid>
            <pubDate>Wed, 13 Aug 2014 16:26:24 -0700</pubDate>
            <itunes:subtitle>While Amazon Web Services (AWS) delivers a secure, scalable cloud computing platform, organizations may be required to deploy an additional layer of security to protect the data they store in the cloud.</itunes:subtitle>
            <itunes:summary>While Amazon Web Services (AWS) delivers a secure, scalable cloud computing platform, organizations may be required to deploy an additional layer of security to protect the data they store in the cloud.

Download this podcast to learn more about:
- Protecting data in AWS
- Best practices for deploying a key manager in the cloud
- Meeting compliance regulations	</itunes:summary>
            <itunes:duration>22:50</itunes:duration>
            <itunes:keywords>encryption, key, management, aws, amazon, cloud, data, security, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>SQL Server Encryption Options</title>
            <description>Encrypting data in Microsoft SQL Server is often difficult to understand because of the different encryption options offered.&lt;br /&gt;
&lt;br /&gt;
Download this 20-minute podcast to learn more about:&lt;br /&gt;
&lt;br /&gt;
• Options for encrypting data in Microsoft SQL Server - TDE, Column-• Level, and with the .NET Framework&lt;br /&gt;
• Managing encryption keys and using Extensible Key Management (EKM)&lt;br /&gt;
• Automating encryption and key management without TDE &amp; EKM&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/080814-SQL-Encryption.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/080814-SQL-Encryption.mp3" length="14749468" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">22822659-5620-40EF-9930-3396ECBA84FF-83243-00009D617D32EDDF-FFA</guid>
            <pubDate>Mon, 11 Aug 2014 14:50:49 -0700</pubDate>
            <itunes:subtitle>Encrypting data in Microsoft SQL Server is often difficult to understand because of the different encryption options offered.</itunes:subtitle>
            <itunes:summary>Encrypting data in Microsoft SQL Server is often difficult to understand because of the different encryption options offered. Download this 20-minute podcast to learn more about: - Options for encrypting data in Microsoft SQL Server - TDE, Column-Level, and with the .NET Framework - Managing encryption keys and using Extensible Key Management (EKM) - Automating encryption and key management without TDE &amp; EKM</itunes:summary>
            <itunes:duration>20:07</itunes:duration>
            <itunes:keywords>encryption, key, management, sql, server, microsoft, TDE, EKM, Transparent, Cell, Column, .NET</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption Performance, Losing Keys, and Other Encryption Concerns</title>
            <description>Expensive encryption and key management solutions, losing encryption keys, and difficult deployments are now a thing of the past.&lt;br /&gt;
&lt;br /&gt;
Download this 20-minute podcast to learn more about:&lt;br /&gt;
•	Encryption performance impacts&lt;br /&gt;
•	Why you shouldn't worry about losing an encryption key&lt;br /&gt;
•	How encryption and key management are now easier than ever&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/052114-Encryption-Concerns.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/052114-Encryption-Concerns.mp3" length="10988773" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">D5C27A9D-9B29-4B59-B3C8-234537BAE9C9-30387-00001A1A68E92057-FFA</guid>
            <pubDate>Wed, 21 May 2014 16:46:19 -0700</pubDate>
            <itunes:subtitle>Expensive encryption and key management solutions, losing encryption keys, and difficult deployments are now a thing of the past.</itunes:subtitle>
            <itunes:summary>Expensive encryption and key management solutions, losing encryption keys, and difficult deployments are now a thing of the past.

Download this 20-minute podcast to learn more about:
• Encryption performance impacts
• Why you shouldn't worry about losing an encryption key
• How encryption and key management are now easier than ever
</itunes:summary>
            <itunes:duration>14:54</itunes:duration>
            <itunes:keywords>encryption, performance, keys, management, concerns, cloud, lose, impact</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Securing Sensitive Data in the Drupal CMS</title>
            <description>Drupal developers who need to protect sensitive data know that storing their encryption keys within the CMS puts their data at risk for a breach.&lt;br /&gt;
&lt;br /&gt;
Users who are currently encrypting sensitive data in Drupal are storing the encryption key locally in either a file protected on the server, in the database, or in Drupal’s settings file.  None of these methods meet data security best practices or compliance regulations such as PCI DSS, HIPAA/HITECH, state privacy laws, etc.&lt;br /&gt;
&lt;br /&gt;
For this special podcast, Chris Teitzel, CEO of Cellar Door Media and Rick Hawkins, owner of Alchemy Web Solutions, join Patrick Townsend, CEO of Townsend Security, to talk about encrypting sensitive data in Drupal.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/012314-Drupal.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/012314-Drupal.mp3" length="217890875" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">2E863F97-05C4-49B7-9B07-F0EED2C7C913-85115-0005C0B2C11131C1-FFA</guid>
            <pubDate>Thu, 23 Jan 2014 15:00:39 -0800</pubDate>
            <itunes:subtitle>Drupal developers who need to protect sensitive data know that storing their encryption keys within the CMS puts their data at risk for a breach.  Listen to this podcast to learn about encryption and key management in Drupal.</itunes:subtitle>
            <itunes:summary>Drupal developers who need to protect sensitive data know that storing their encryption keys within the CMS puts their data at risk for a breach.

Users who are currently encrypting sensitive data in Drupal are storing the encryption key locally in either a file protected on the server, in the database, or in Drupal’s settings file.  None of these methods meet data security best practices or compliance regulations such as PCI DSS, HIPAA/HITECH, state privacy laws, etc.

For this special podcast, Chris Teitzel, CEO of Cellar Door Media and Rick Hawkins, owner of Alchemy Web Solutions, join Patrick Townsend, CEO of Townsend Security, to talk about encrypting sensitive data in Drupal.</itunes:summary>
            <itunes:duration>29:54</itunes:duration>
            <itunes:keywords>Drupal, encryption, key, management, security, compliance, pci</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption Key Management in Windows Azure</title>
            <description>As organizations are moving their applications and sensitive data to Windows Azure and leaving behind the traditional data center, they are turning to virtual machines to run their IT infrastructure.  Townsend Security recently release the first encryption key manager to run in Microsoft Windows Azure, solving the data security problem that has held many companies back.&lt;br /&gt;
&lt;br /&gt;
- Download this podcast to hear Patrick Townsend discuss:&lt;br /&gt;
- Protecting data in Microsoft Windows Azure&lt;br /&gt;
- Best practices for deploying a key manager in the cloud&lt;br /&gt;
- Meeting compliance regulations&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/011614-Azure.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/011614-Azure.mp3" length="13167692" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">CE1C2AB4-90A8-4127-9C0B-CB98BEFD37B0-25022-00039FDA0074DEDC-FFA</guid>
            <pubDate>Thu, 16 Jan 2014 15:34:36 -0800</pubDate>
            <itunes:subtitle>As organizations are moving their applications and sensitive data to Windows Azure and leaving behind the traditional data center, they are turning to virtual machines to run their IT infrastructure.</itunes:subtitle>
            <itunes:summary>As organizations are moving their applications and sensitive data to Windows Azure and leaving behind the traditional data center, they are turning to virtual machines to run their IT infrastructure.  Townsend Security recently release the first encryption key manager to run in Microsoft Windows Azure, solving the data security problem that has held many companies back.

- Download this podcast to hear Patrick Townsend discuss:
- Protecting data in Microsoft Windows Azure
- Best practices for deploying a key manager in the cloud
- Meeting compliance regulations
</itunes:summary>
            <itunes:duration>17:55</itunes:duration>
            <itunes:keywords>encryption, key, management, microsoft, windows, azure, cloud, data, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Two Factor Authentication on the IBM i</title>
            <description>User names and passwords are no longer good enough. To protect sensitive data, businesses need another layer of security and are often turning to two factor authentication. By deploying a two factor authentication solution organizations can easily enhance their security in a cost-effective way, as well as meet compliance regulations and recommendations.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2014/010914-2FA.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2014/010914-2FA.mp3" length="12857975" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">CA8EA81D-F4F8-48A0-A5AA-B2970E450385-79056-0001E24FD02DBBF2-FFA</guid>
            <pubDate>Thu, 09 Jan 2014 09:39:56 -0800</pubDate>
            <itunes:subtitle>User names and passwords are no longer good enough. To protect sensitive data, IBM i administrators need another layer of security and are often turning to two factor authentication.</itunes:subtitle>
            <itunes:summary>User names and passwords are no longer good enough. To protect sensitive data, businesses need another layer of security and are often turning to two factor authentication. By deploying a two factor authentication solution organizations can easily enhance their security in a cost-effective way, as well as meet compliance regulations and recommendations.</itunes:summary>
            <itunes:duration>17:30</itunes:duration>
            <itunes:keywords>Two Factor Authentication, IBM i, AS400, Data Security, Passwords, Mobile, Multi-Factor Authentication, Compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption Key Management - Hardware, Virtualized, and Cloud Compared</title>
            <description>With encryption key management now being offered on hardware, virtualized, and cloud platforms, is it simply just a matter of preference or is one option better than another?&lt;br /&gt;
&lt;br /&gt;
Download this 20-minute podcast to learn more about:&lt;br /&gt;
•	Deploying encryption key management as an HSM, Cloud HSM, Virtual Appliance (VMware, Hyper-v, Xen) or in the cloud (Windows Azure, Amazon Web Services, vCloud, etc.)&lt;br /&gt;
•	Factors to consider when deciding which option is right or you&lt;br /&gt;
•	What compliance regulations say about the different options&lt;br /&gt;
•	Challenges for applications running in the cloud or virtual environments&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/12182013-key-management-differences.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/12182013-key-management-differences.mp3" length="13112229" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">7AC1AD91-54D8-4B5A-B7D8-A8A3ADA095F0-3142-000484F3D6B355DA-FFA</guid>
            <pubDate>Wed, 18 Dec 2013 11:37:38 -0800</pubDate>
            <itunes:subtitle>With encryption key management now being offered on hardware, virtualized, and cloud platforms, is it simply just a matter of preference or is one option better than another?</itunes:subtitle>
            <itunes:summary>With encryption key management now being offered on hardware, virtualized, and cloud platforms, is it simply just a matter of preference or is one option better than another?

Download this 20-minute podcast to learn more about:
•	Deploying encryption key management as an HSM, Cloud HSM, Virtual Appliance (VMware, Hyper-v, Xen) or in the cloud (Windows Azure, Amazon Web Services, vCloud, etc.)
•	Factors to consider when deciding which option is right or you
•	What compliance regulations say about the different options
•	Challenges for applications running in the cloud or virtual environments
</itunes:summary>
            <itunes:duration>17:51</itunes:duration>
            <itunes:keywords>encryption, key management, hsm, cloud, Windows Azure, Amazon, Virtual, VMware, security, differences, compared</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Securing Data with Encryption Key Management in the Cloud</title>
            <description> Organizations who encrypt data in the cloud regularly report that loss of control of cryptographic keys is a top concern.  Advances in encryption technology have made protected sensitive data easier than ever.  However, encryption key management has remained a challenge.&lt;br /&gt;
&lt;br /&gt;
Organizations are now able to address this problem with the recent introduction of encryption key management in the cloud.&lt;br /&gt;
     &lt;br /&gt;
Joining us today is Patrick Townsend, CEO of Townsend Security.  We will discuss why encryption key management has been difficult for organizations who store their data in the cloud, special considerations for meeting compliance regulations, and what to look for when considering a cloud key management solution.&lt;br /&gt;
</description>
            <link>http://townsendsecurity.com/downloads/podcast/2013/102813-Cloud-HSM.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2013/102813-Cloud-HSM.mp3" length="12366461" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">3B8635FF-D172-40C9-87F2-68BDC7F8C493-49428-0004A0017B5B4BF3-FFA</guid>
            <pubDate>Mon, 28 Oct 2013 16:32:11 -0700</pubDate>
            <itunes:subtitle>Why encryption key management has been difficult for organizations who store their data in the cloud, special considerations for meeting compliance, and what to look for in a cloud key manager.</itunes:subtitle>
            <itunes:summary> Organizations who encrypt data in the cloud regularly report that loss of control of cryptographic keys is a top concern.  Advances in encryption technology have made protected sensitive data easier than ever.  However, encryption key management has remained a challenge.

Organizations are now able to address this problem with the recent introduction of encryption key management in the cloud.

Joining us today is Patrick Townsend, CEO of Townsend Security.  We will discuss why encryption key management has been difficult for organizations who store their data in the cloud, special considerations for meeting compliance regulations, and what to look for when considering a cloud key management solution.</itunes:summary>
            <itunes:duration>16:50</itunes:duration>
            <itunes:keywords>encryption, key management, cloud, hsm, data, security, compliance, PCI, Affordable</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Guidelines for Effective Encryption Key Management</title>
            <description>As more enterprises begin to outsource hosting and move confidential data to the cloud, the protection of encryption keys become the number one action that determines the true effectiveness of their encryption strategy.&lt;br /&gt;
&lt;br /&gt;
In this podcast, Patrick Townsend discusses the information security CIA triad (confidentiality, integrity, and availability) and how it relates to encryption key management, what compliance regulations say about managing encryption keys, and how encryption and key management arm enterprises with a strong, defense-in-depth approach to data security.&lt;br /&gt;
</description>
            <link>http://townsendsecurity.com/downloads/podcast/2013/100813-Guidelines-for-KM.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2013/100813-Guidelines-for-KM.mp3" length="15261354" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">42EEF68C-62EF-49E6-BE30-57DD40AD788F-68966-0005B56C9029C9D6-FFA</guid>
            <pubDate>Tue, 08 Oct 2013 15:47:24 -0700</pubDate>
            <itunes:subtitle>In this podcast: The InfoSec CIA triad and how it relates to encryption key management, what compliance regulations say about managing encryption keys, and how key management is essential to a strong, defense-in-depth approach to data security.</itunes:subtitle>
            <itunes:summary>As more enterprises begin to outsource hosting and move confidential data to the cloud, the protection of encryption keys become the number one action that determines the true effectiveness of their encryption strategy.

In this podcast, Patrick Townsend discusses the information security CIA triad (confidentiality, integrity, and availability) and how it relates to encryption key management, what compliance regulations say about managing encryption keys, and how encryption and key management arm enterprises with a strong, defense-in-depth approach to data security.
</itunes:summary>
            <itunes:duration>20:50</itunes:duration>
            <itunes:keywords>Encryption Key Management, Guidelines, NIST, Best Practices, Information Security, Defense in Depth</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Gambling with Guests - The House Doesn't Win with Unsecure PII</title>
            <description>Is Your Property Management System Really Secure?&lt;br /&gt;
&lt;br /&gt;
 According to a new report by British insurance firm WIllis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with 38% of those attacks targeting hotels, resorts, and casinos.  Property Management Systems (PMS) contain a deep well of Personally Identifiable Information (PII), such as credit card numbers, phone numbers, email addresses, etc., which is often not properly secure within a PMS - leaving users at risk for a breach.&lt;br /&gt;

&lt;br /&gt;
Download this podcast to learn:&lt;br /&gt;
&lt;br /&gt;
    How Property Management Systems can better secure guest data&lt;br /&gt;
    Why the hospitality industry is a target for data thieves&lt;br /&gt;
    How PMS vendors can boost their own security posture&lt;br /&gt;
    How ISVs and Solution Providers can gain additional revenue by offering stronger data security</description>
            <link>http://townsendsecurity.com/downloads/podcast/2013/092313-hospitality-gambling.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2013/092313-hospitality-gambling.mp3" length="12076826" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">883AC20A-DA04-4B02-B6D0-0DF288A8877C-85751-0001912626EE9996-FFA</guid>
            <pubDate>Tue, 24 Sep 2013 11:40:06 -0700</pubDate>
            <itunes:subtitle>Property Management Systems (PMS) contain a deep well of Personally Identifiable Information (PII), such as credit card numbers, phone numbers, email addresses, etc., which is often not properly secure within a PMS - leaving users at risk for a breach.</itunes:subtitle>
            <itunes:summary>Is Your Property Management System Really Secure?

According to a new report by British insurance firm WIllis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with 38% of those attacks targeting hotels, resorts, and casinos.  Property Management Systems (PMS) contain a deep well of Personally Identifiable Information (PII), such as credit card numbers, phone numbers, email addresses, etc., which is often not properly secure within a PMS - leaving users at risk for a breach.</itunes:summary>
            <itunes:duration>16:25</itunes:duration>
            <itunes:keywords>hospitality, data, security, property management system, gaming, PII, privacy</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Must Haves in an Encryption Key Manager</title>
            <description><![CDATA[Encryption and key management are now industry standards and work across both legacy and newer business systems, multi-platform and multi-tenant networks, remote access workstations, geographical offices, data centers, and third-party business partners. But how do you know what to take into consideration when deciding on an encryption key manager?<br />
<br />
 <br />
<br />
Download this podcast to hear Joan Ross, CEO, discuss:<br />
<br />
    "Must Haves" when evaluating an encryption key manager<br />
    Just because data is encrypted, it doesn't necessarily mean it is safe<br />
    Principles of effective encryption key management<br />
    Special considerations for companies who are moving their data into the cloud<br />
]]></description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/090613-key-management-must-haves.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/090613-key-management-must-haves.mp3" length="11058989" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">9072CC71-157D-44AC-A9FB-0E26006AAD88-28521-0000B28CFE0E4737-FFA</guid>
            <pubDate>Fri, 06 Sep 2013 16:41:48 -0700</pubDate>
            <itunes:subtitle>Encryption and key management are now industry standards and work across multi-platform and multi-tenant networks, geographical offices, and third-party business partners. But how do you know what else to look for?</itunes:subtitle>
            <itunes:summary>Encryption and key management are now industry standards and work across both legacy and newer business systems, multi-platform and multi-tenant networks, remote access workstations, geographical offices, data centers, and third-party business partners. But how do you know what to take into consideration when deciding on an encryption key manager?

Download this podcast to hear Joan Ross, CEO, discuss:

- &quot;Must Haves&quot; when evaluating an encryption key manager
- Just because data is encrypted, it doesn't necessarily mean it is safe
- Principles of effective encryption key management
- Special considerations for companies who are moving their data into the cloud
</itunes:summary>
            <itunes:duration>15:00</itunes:duration>
            <itunes:keywords>encryption, key, management, must, haves, compliance, data, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>PGP Encryption on the IBM i - Securing Data in Motion</title>
            <description>PGP encryption has become the de facto standard for securing data in motion on the IBM i. It can help businesses meet compliance regulations such as PCI DSS by encryption credit cards and other PII as it is in transit to your trading partners.&lt;br /&gt;
&lt;br /&gt;
In this podcast, Patrick Townsend discusses the differences between Open PGP and Commercial PGP, which version a company who faces compliance regulations should use, and how Townsend Security is helping IBM i users secure their data with PGP encryption.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/081413-PGP.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/081413-PGP.mp3" length="11410381" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">8D6BAC78-C931-417F-9A70-07A292A01B76-92955-00061428CA12B050-FFA</guid>
            <pubDate>Wed, 14 Aug 2013 10:58:49 -0700</pubDate>
            <itunes:subtitle>Learn the differences between Open PGP and Commercial PGP, which version a company who faces compliance regulations should use, and how Townsend Security is helping IBM i users secure their data with PGP encryption.</itunes:subtitle>
            <itunes:summary>PGP encryption has become the de facto standard for securing data in motion on the IBM i. It can help businesses meet compliance regulations such as PCI DSS by encryption credit cards and other PII as it is in transit to your trading partners.

In this podcast, Patrick Townsend discusses the differences between Open PGP and Commercial PGP, which version a company who faces compliance regulations should use, and how Townsend Security is helping IBM i users secure their data with PGP encryption.</itunes:summary>
            <itunes:duration>15:29</itunes:duration>
            <itunes:keywords>PGP, encryption, IBM i, AS400, Managed File Transfer, Data in Motion, iSeries, Open, Commercial, Compliance, PCI DSS</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Reducing Your IT Footprint with Virtualized Encryption Key Management</title>
            <description>Server virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained in a physical world. Now Organizations can deploy servers in both their data centers and the cloud using virtualization technologies such as VMware.&lt;br /&gt;
&lt;br /&gt;
Download this podcast to hear Patrick Townsend discuss:&lt;br /&gt;
•	The benefits of virtualized encryption key management&lt;br /&gt;
•	How organizations can use virtualized servers in their data centers and the cloud&lt;br /&gt;
•	Special compliance considerations for enterprises who virtualize their infrastructure&lt;br /&gt;
•	What Townsend Security is doing to help organizations deploy virtualized encryption key management&lt;br /&gt;
</description>
            <link>http://townsendsecurity.com/downloads/podcast/2013/070213-VMware-KM.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2013/070213-VMware-KM.mp3" length="12668023" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">7D81DD65-4B3B-47F8-B6B4-F0C181A56A8A-31136-0002A9BC3FC7768E-FFA</guid>
            <pubDate>Wed, 03 Jul 2013 11:43:57 -0700</pubDate>
            <itunes:subtitle>Virtualized encryption and key management is an excellent way to reduce hardware costs, lower operational costs, and minimize your IT footprint. Patrick Townsend discusses virtualized encryption and key management with VMware.</itunes:subtitle>
            <itunes:summary>Server virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained in a physical world. Now Organizations can deploy servers in both their data centers and the cloud using virtualization technologies such as VMware.

Download this podcast to hear Patrick Townsend discuss:
•	The benefits of virtualized encryption key management
•	How organizations can use virtualized servers in their data centers and the cloud
•	Special compliance considerations for enterprises who virtualize their infrastructure
•	What Townsend Security is doing to help organizations deploy virtualized encryption key management
</itunes:summary>
            <itunes:duration>17:14</itunes:duration>
            <itunes:keywords>virtualized, vmware, serve, footprint, encryptinon, key, management, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Top IBM i Security Tips with Patrick Botz and Patrick Townsend</title>
            <description>As a data security company, we see plenty of organizations think they are doing the right things to keep their data safe, but are falling down on a few key areas.&lt;br /&gt;
&lt;br /&gt;
For this special podcast, Patrick Botz of Botz and Associates joins Patrick Townsend to present their top three IBM i security tips to help keep your IBM i secure and data safe.&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/061413-IBMi-Tips.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/061413-IBMi-Tips.mp3" length="17339034" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">1CA1FCE0-B6AF-45EF-9E35-FCE74FE285D7-5840-0000FEBCE9AFCB45-FFA</guid>
            <pubDate>Fri, 14 Jun 2013 14:32:41 -0700</pubDate>
            <itunes:subtitle>As a data security company, we see plenty of organizations think they are doing the right things to keep data safe, but are falling down on a few key areas.

Patrick Botz of Botz joins Patrick Townsend to present their top three IBM i security tips.</itunes:subtitle>
            <itunes:summary>As a data security company, we see plenty of organizations think they are doing the right things to keep their data safe, but are falling down on a few key areas.

For this special podcast, Patrick Botz of Botz and Associates joins Patrick Townsend to present their top three IBM i security tips to help keep your IBM i secure and data safe.
</itunes:summary>
            <itunes:duration>23:43</itunes:duration>
            <itunes:keywords>encryption, logging, SSO, password, management, data, security, patrick, botz, townsend, IBM, AS400</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Got Security? How Retail ISVs Can Improve Their Payment Applications</title>
            <description>While payment application vendors are required to certify their payment applications with PCI, compliance regulations are not set in stone and likely to change. Retail ISVs need to be aware of this, and that just because their solution was certified yesterday, their encryption and key management practices might not suffice during their next certification.&lt;br /&gt;
&lt;br /&gt;
Join Patrick Townsend, Founder and CEO, as he discusses:&lt;br /&gt;
•	The challenges that POS and Payment Application Vendors have with securing their customers’ data&lt;br /&gt;
•	Why meeting compliance regulations is really the low-bar for data security&lt;br /&gt;
•	How Townsend Security has re-defined what it means to partner with a security company&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/060313-ISV.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/060313-ISV.mp3" length="11688107" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">9811291D-4419-4B18-9A54-A8CDC26B5633-74507-0000EAE6D3BCBE8F-FFA</guid>
            <pubDate>Mon, 03 Jun 2013 08:57:28 -0700</pubDate>
            <itunes:subtitle>Compliance regulations are constantly evolving. Retail ISVs need to be aware that their encryption and key management practices might not suffice tomorrow. Learn about data security challenges retails ISVs have and how Townsend Security can help.</itunes:subtitle>
            <itunes:summary>While payment application vendors are required to certify their payment applications with PCI, compliance regulations are not set in stone and likely to change. Retail ISVs need to be aware of this, and that just because their solution was certified yesterday, their encryption and key management practices might not suffice during their next certification.

Join Patrick Townsend, Founder and CEO, as he discusses:
• The challenges that POS and Payment Application Vendors have with securing their customers’ data
• Why meeting compliance regulations is really the low-bar for data security
• How Townsend Security has re-defined what it means to partner with a security company
</itunes:summary>
            <itunes:duration>15:52</itunes:duration>
            <itunes:keywords>encryption, key, management, partner, ISV, POS, payment, application, PCI, data, security, credit, card</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Stepping Up Security: Easy Ways POS Vendors Can Better Protect Their Customers</title>
            <description>Data security is a huge concern for retail companies who expect their point of sale (POS) system vendors to protect their customers’ data. Although POS vendors are required to certify their POS devices with the Payment Card Industry (PCI), many still scrape by with poor encryption and key management practices in their payment applications.&lt;br /&gt;
&lt;br /&gt;
Join Patrick Townsend, Founder and CEO, as he discusses:&lt;br /&gt;
•	The challenges that POS vendors have with securing their customers’ data&lt;br /&gt;
•	Why meeting compliance regulations is really the low-bar for data security&lt;br /&gt;
•	How Townsend Security has re-defined what it means to partner with a security company&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/060313-POS.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/060313-POS.mp3" length="12080661" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">EA10F018-B9F3-4747-B0D4-DDD0535ED716-74507-0000EA215E6210C8-FFA</guid>
            <pubDate>Mon, 03 Jun 2013 08:39:17 -0700</pubDate>
            <itunes:subtitle>Although POS vendors are required to certify their POS devices with PCI, many still scrape by with poor encryption and key management practices in their payment applications. Learn about the challenges POS vendors have and how Townsend Security can help.</itunes:subtitle>
            <itunes:summary>Data security is a huge concern for retail companies who expect their point of sale (POS) system vendors to protect their customers’ data. Although POS vendors are required to certify their POS devices with the Payment Card Industry (PCI), many still scrape by with poor encryption and key management practices in their payment applications.

Join Patrick Townsend, Founder and CEO, as he discusses:
• The challenges that POS vendors have with securing their customers’ data
• Why meeting compliance regulations is really the low-bar for data security
• How Townsend Security has re-defined what it means to partner with a security company
</itunes:summary>
            <itunes:duration>16:25</itunes:duration>
            <itunes:keywords>encryption, key, management, partner, ISV, POS, payment, application, PCI, data, security, credit, card</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Managing TrueCrypt Encryption Passwords</title>
            <description>Until recently, password management has been a challenge for TrueCrypt encryption users. Enterprises can now encrypt sensitive data for any Windows application or folder with TrueCrypt and create cryptographically strong passwords with Alliance Key Manager, a FIPS 140-2 compliant key management HSM.&lt;br /&gt;
&lt;br /&gt;
In this 15-minute podcast Patrick Townsend discusses:&lt;br /&gt;
&lt;br /&gt;
    Why an organization would use TrueCrypt encryption&lt;br /&gt;
    Meeting the challenges of managing TrueCrypt passwords&lt;br /&gt;
    What Townsend Security is doing to help organizations manage TrueCrypt passwords&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/042213-TrueCrypt.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/042213-TrueCrypt.mp3" length="12144524" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">C099CA7D-4FE7-4F29-86D9-5127C2AAAF70-71681-0000876B37907188-FFA</guid>
            <pubDate>Mon, 20 May 2013 15:57:09 -0700</pubDate>
            <itunes:subtitle>Password management has been a challenge for TrueCrypt users. Join Patrick Townsend as he discusses how Enterprises can encrypt sensitive data for any Windows application or folder with TrueCrypt and create cryptographically strong passwords.</itunes:subtitle>
            <itunes:summary>Until recently, password management has been a challenge for TrueCrypt encryption users. Enterprises can now encrypt sensitive data for any Windows application or folder with TrueCrypt and create cryptographically strong passwords with Alliance Key Manager, a FIPS 140-2 compliant key management HSM.

In this 15-minute podcast Patrick Townsend discusses:

- Why an organization would use TrueCrypt encryption
- Meeting the challenges of managing TrueCrypt passwords
- What Townsend Security is doing to help organizations manage TrueCrypt passwords
</itunes:summary>
            <itunes:duration>16:30</itunes:duration>
            <itunes:keywords>TrueCrypt, Password, Management, Encryption, Windows, Application, Volume</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Mobile Security – Protecting Sensitive Data</title>
            <description>With the push to make more data and business applications accessible to workers from their mobile devices, administrators have new security concerns.  Security expert Patrick Botz joins us to discuss how to keep valuable data secure in the face of mobility and to offer suggestions on how to simplify this complex issue. </description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/050313-Mobile-Security.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/050313-Mobile-Security.mp3" length="8656870" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">5758FBF6-A3D2-4B7B-9C79-5512D3FDDE67-97909-000144BADBF75F80-FFA</guid>
            <pubDate>Fri, 03 May 2013 11:36:36 -0700</pubDate>
            <itunes:subtitle>Mobile Security – Protecting Sensitive Data</itunes:subtitle>
            <itunes:summary>With the push to make more data and business applications accessible to workers from their mobile devices, administrators have new security concerns.  Security expert Patrick Botz joins us to discuss how to keep valuable data secure in the face of mobility and to offer suggestions on how to simplify this complex issue. </itunes:summary>
            <itunes:duration>11:40</itunes:duration>
            <itunes:keywords>mobile, security, data, privacy, business, applications</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>FIELDPROC Encryption on the IBM i</title>
            <description>With IBM ending support on V5R4 of the IBM i later this year, many organizations are in the process of upgrading their systems to V7R1.  In V7R1, IBM introduced support for automatic, field-level encryption in the DB2 database called FIELDPROC (short for &quot;Field Procedures&quot;).  This allows IBM i users to now deploy encryption without making any program changes.&lt;br /&gt;
&lt;br /&gt;
Listen to this podcast to hear Patrick Botz, former lead security architect for IBM, and Patrick Townsend, Founder &amp; CEO, discuss encryption, key management, and meeting compliance regulations on the IBM i.</description>
            <link>http://townsendsecurity.com/downloads/podcast/2013/041613-FIELDPROC.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2010/032910_ManyFlavorsProtection.mp3" length="10995032" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">9759EDEE-CC2D-49B1-84A5-66D41FC7D9B1-64768-00021E35D25BB604-FFA</guid>
            <pubDate>Fri, 03 May 2013 08:59:01 -0700</pubDate>
            <itunes:subtitle>Patrick Botz, former lead security architect for IBM, and Patrick Townsend, Founder &amp; CEO, recently sat down to discuss FIELDPROC encryption, key management, and meeting compliance regulations on the IBM i.</itunes:subtitle>
            <itunes:summary>With IBM ending support on V5R4 of the IBM i later this year, many organizations are in the process of upgrading their systems to V7R1. In V7R1, IBM introduced support for automatic, field-level encryption in the DB2 database called FIELDPROC (short for &quot;Field Procedures&quot;). This allows IBM i users to now deploy encryption without making any program changes. Listen to this podcast to hear Patrick Botz, former lead security architect for IBM, and Patrick Townsend, Founder &amp; CEO, discuss encryption, key management, and meeting compliance regulations on the IBM i.</itunes:summary>
            <itunes:duration>14:54</itunes:duration>
            <itunes:keywords>encryption, IBM i, as400, key, management, FIELDPROC, data, security, v7r1</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>HIPAA/HITECH Act Breach Notification Meaningful Use Update</title>
            <description>The Department of Health and Human Services (HHS) recently released an update to its meaningful use policies about encrypting patient information.  They made one thing perfectly clear – the only way to avoid the data breach notification requirement, and potential fines, is to encrypt the data.  With small and mid-sized businesses increasingly the target of cyber attacks, the time to address encrypting personal health information (PHI) is now.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/030613-HITECH-Update.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/030613-HITECH-Update.mp3" length="10210786" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">1B9463B9-BB7D-421F-AD24-1D7AB816C440-4080-0000A5349B20F791-FFA</guid>
            <pubDate>Wed, 06 Mar 2013 11:27:25 -0800</pubDate>
            <itunes:subtitle>HHS recently updated its meaningful use policies about encrypting patient information.  They made one thing perfectly clear – the only way to avoid the data breach notification requirement, and potential fines, is to encrypt the data</itunes:subtitle>
            <itunes:summary>The Department of Health and Human Services (HHS) recently released an update to its meaningful use policies about encrypting patient information.  They made one thing perfectly clear – the only way to avoid the data breach notification requirement, and potential fines, is to encrypt the data.  With small and mid-sized businesses increasingly the target of cyber attacks, the time to address encrypting personal health information (PHI) is now.</itunes:summary>
            <itunes:duration>14:05</itunes:duration>
            <itunes:keywords>HIPAA, HITECH, encryption, key, management, meaningful, use, HHS, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Extending the Life of Your IBM i with PHP</title>
            <description>Sensitive data can now be automatically encrypted using Townsend Security's NIST-certified encryption libraries and developers can use cross-platform PHP to easily communicate with modern systems.  Additionally, PHP can be used to transform complicated green screens into a familiar, simple user interface.&lt;br /&gt;
&lt;br /&gt;
For this special podcast, Eric Nies from NSC Software Solutions joins Patrick Townsend, Founder and CEO of Townsend Security, to discuss data security with PHP on the IBM i.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2013/011013-NSC-PHP.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2013/011013-NSC-PHP.mp3" length="11207303" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">3F152A90-A6AB-4470-AB22-267CFE6FC3C4-3692-0000543DF175BA64-FFA</guid>
            <pubDate>Thu, 10 Jan 2013 10:57:26 -0800</pubDate>
            <itunes:subtitle>Sensitive data can now be automatically encrypted using NIST-certified encryption libraries and developers can use cross-platform PHP to easily communicate with modern systems. Additionally, PHP can be used to give green screens a modern user interface.</itunes:subtitle>
            <itunes:summary>Sensitive data can now be automatically encrypted using Townsend Security's NIST-certified encryption libraries and developers can use cross-platform PHP to easily communicate with modern systems.  Additionally, PHP can be used to transform complicated green screens into a familiar, simple user interface.

For this special podcast, Eric Nies from NSC Software Solutions joins Patrick Townsend, Founder and CEO of Townsend Security, to discuss data security with PHP on the IBM i.
</itunes:summary>
            <itunes:duration>15:28</itunes:duration>
            <itunes:keywords>security, encryption, php, ibm i, iseries, as400, key management, enterprise, CTO, Zend</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Simplifying Encryption Key Management - Removing Complexity and Cost</title>
            <description>Meeting compliance regulations doesn't need to be complex or costly - as long as you are using the correct key management tools.&lt;br /&gt;&lt;br /&gt;

Listen to this podcast to hear Patrick Townsend, Founder &amp; CEO, discuss what compliance requirements require key management, identify the barriers to good key management, and what to look for when evaluating an encryption key manager.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/121912-simplifying-key-management.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/121912-simplifying-key-management.mp3" length="12871556" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">BFE594EA-6E5A-494E-B45B-0C54365B9C91-91149-0001E38A5F4F2696-FFA</guid>
            <pubDate>Wed, 19 Dec 2012 15:13:14 -0800</pubDate>
            <itunes:subtitle>Meeting compliance regulations doesn't need to be complex or costly - as long as you are using the correct key management tools.</itunes:subtitle>
            <itunes:summary>Meeting compliance regulations doesn't need to be complex or costly - as long as you are using the correct key management tools. Listen to this podcast to hear Patrick Townsend, Founder &amp; CEO, discuss what compliance requirements require key management, identify the barriers to good key management, and what to look for when evaluating an encryption key manager.</itunes:summary>
            <itunes:duration>17:47</itunes:duration>
            <itunes:keywords>encryption, key, management, risk, affordable, FIPS, data, enterprise, privacy, compliance, pci, hipaa</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>IBM i Has Single Sign On (SSO) - You Just Have to Enable It!</title>
            <description>Password management continues to be a challenge for all organizations - large and small. Poor management leads to insecure passwords and inconsistent policies – and these lead to more data breaches.  &lt;br /&gt;
&lt;br /&gt;
For this special podcast, Patrick Botz joins us to talk about Single Sign On on the IBM i and how it can be used to easily and securely manage user accounts and passwords.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/112612-Botz-SSO.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/112612-Botz-SSO.mp3" length="13259002" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">92B27AFE-C429-46EB-A141-97866C80B1EF-51502-0001D69D74F49F7A-FFA</guid>
            <pubDate>Tue, 27 Nov 2012 08:52:24 -0800</pubDate>
            <itunes:subtitle>Password management continues to be a challenge for all organizations - large and small. Poor management leads to insecure passwords and inconsistent policies – and these lead to more data breaches.</itunes:subtitle>
            <itunes:summary>Password management continues to be a challenge for all organizations - large and small. Poor management leads to insecure passwords and inconsistent policies – and these lead to more data breaches. 

For this special podcast, Patrick Botz joins us to talk about Single Sign On on the IBM i and how it can be used to easily and securely manage user accounts and passwords.</itunes:summary>
            <itunes:duration>18:19</itunes:duration>
            <itunes:keywords>single sign on, SSO, IBM i, AS400, Patrick Botz, iSeries, System i, password, security</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>File Integrity Monitoring (FIM) on the IBM i</title>
            <description>File Integrity Monitoring (FIM) tools allow administrators to selectively monitor data access and change activity at the column or field level - without changing applications or user accounts.  Join Patrick Townsend as he discusses why implementing FIM tools is a best practice and compliance requirement, how administrators are using them, and what makes the Townsend Security solution unique.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/103112-FIM.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/103112-FIM.mp3" length="11540259" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">C0F95F03-82DD-4265-B099-AF2016158003-28295-00007D19276D98F4-FFA</guid>
            <pubDate>Wed, 31 Oct 2012 13:38:06 -0700</pubDate>
            <itunes:subtitle>File Integrity Monitoring (FIM) tools allow administrators to selectively monitor data access and change activity at the column or field level - without changing applications or user accounts.</itunes:subtitle>
            <itunes:summary>File Integrity Monitoring (FIM) tools allow administrators to selectively monitor data access and change activity at the column or field level - without changing applications or user accounts.  Join Patrick Townsend as he discusses why implementing FIM tools is a best practice and compliance requirement, how administrators are using them, and what makes the Townsend Security solution unique.</itunes:summary>
            <itunes:duration>15:56</itunes:duration>
            <itunes:keywords>File Integrity Monitoring, FIM, IBM i, iSeries, AS400, compliance, logging, system, monitoring</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Microsoft Azure - Securing Data with Encryption and Key Management</title>
            <description>As organizations adopt Microsoft’s Azure cloud offering, one of the top questions we hear is “How do I protect my sensitive data?”&lt;br /&gt;
&lt;br /&gt;
In this podcast, Patrick Townsend discusses protecting sensitive data in Azure with encryption and key management, performance considerations, best practices for managing encryption keys, and what to look for when deciding on an encryption key management solution.  Additionally, we discuss the importance of having a key management strategy that lines up with the various compliance regulations.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/101212-Securing-Azure.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/101212-Securing-Azure.mp3" length="12132111" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">86A95044-B65B-4899-8A40-2EB315BC4367-48307-00014695085A8570-FFA</guid>
            <pubDate>Fri, 12 Oct 2012 13:19:56 -0700</pubDate>
            <itunes:subtitle>As organizations adopt Microsoft’s Azure cloud offering, one of the top questions we hear is “How do I protect my sensitive data?” Our answer: “With encryption and key management.”</itunes:subtitle>
            <itunes:summary>As organizations adopt Microsoft’s Azure cloud offering, one of the top questions we hear is “How do I protect my sensitive data?” Our answer: “With encryption and key management.”

In this podcast, Patrick Townsend discusses protecting sensitive data in Azure with encryption and key management, performance considerations, best practices for managing encryption keys, and what to look for when deciding on an encryption key management solution.  Additionally, we discuss the importance of having a key management strategy that lines up with the various compliance regulations.
</itunes:summary>
            <itunes:duration>16:45</itunes:duration>
            <itunes:keywords>microsoft, azure, encryption, key, management, data, privacy, compliance, SQL</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Higher Education Under Attack - Data Privacy 101</title>
            <description>Recently colleges and universities have become a target for data thieves and are suffering an increased number of data breaches.  This podcast discusses why these organizations are experiencing a higher level of attacks, as well as what they can do to protect themselves.  Additionally, learn four things to increase your data security that you can get started with today.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/082312-Higher-Education.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/082312-Higher-Education.mp3" length="9011192" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">8E93EDA9-DB8E-4058-BE28-7E760AF45736-4671-00043745931C6A8F-FFA</guid>
            <pubDate>Fri, 24 Aug 2012 10:25:57 -0700</pubDate>
            <itunes:subtitle>Colleges and universities have become a target for data thieves and are suffering an increased number of data breaches. Learn why there has been an increase in attacks and four things you can do today to increase the security of your data.</itunes:subtitle>
            <itunes:summary>Recently colleges and universities have become a target for data thieves and are suffering an increased number of data breaches.  This podcast discusses why these organizations are experiencing a higher level of attacks, as well as what they can do to protect themselves.  Additionally, learn four things to increase your data security that you can get started with today.</itunes:summary>
            <itunes:duration>12:25</itunes:duration>
            <itunes:keywords>higher education, college, university, data, privacy, breach, encryption, key management</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Securing SharePoint with Encryption and Key Management</title>
            <description>Do you use Microsoft SharePoint in your organization to share documents that contain sensitive information? Did you know that these documents probably fall under compliance laws and regulations? &lt;br /&gt;
&lt;br /&gt;
Join Patrick Townsend as he discusses why businesses need to secure their SharePoint servers, how easy it can be, and where he sees users falling down with their data protection strategy.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/082012-SharePoint.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/082012-SharePoint.mp3" length="9414888" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">C186C5F3-2F31-4940-AB62-96219B626F93-77127-000314A077C0B611-FFA</guid>
            <pubDate>Mon, 20 Aug 2012 08:15:32 -0700</pubDate>
            <itunes:subtitle>Do you use SharePoint to share documents that contain sensitive information? If so you probably fall under compliance laws. Join us and learn why businesses need to secure their SharePoint servers, how easy it can be, and where he sees users falling down.</itunes:subtitle>
            <itunes:summary>Do you use Microsoft SharePoint in your organization to share documents that contain sensitive information? Did you know that these documents probably fall under compliance laws and regulations? Join Patrick Townsend as he discusses why businesses need to secure their SharePoint servers, how easy it can be, and where he sees users falling down with their data protection strategy.</itunes:summary>
            <itunes:duration>12:56</itunes:duration>
            <itunes:keywords>Microsoft, SharePoint, Security, Compliance, Encryption, Key Management, SQL Server, TDE, EKM</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Tape Encryption - Not Enough</title>
            <description>While creating encrypted backup tapes is an excellent practice, for many organizations it is often the only time their data gets encrypted.  Patrick Townsend discusses some misconceptions he is seeing around encryption and tape backups, what organizations should be doing to secure their sensitive data before it gets backed up to tape, and what compliance regulations say on when data needs to be encrypted.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/072312-Tape-Encryption.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/072312-Tape-Encryption.mp3" length="12172212" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">8DBF7BFE-7C35-45AB-8622-0B5349639AB8-363-00000163385960DD-FFA</guid>
            <pubDate>Mon, 23 Jul 2012 08:29:21 -0700</pubDate>
            <itunes:subtitle>While creating encrypted backup tapes is an excellent practice, it is often not enough.  Learn what you should be doing to secure sensitive data before it gets backed up to tape and what compliance regulations say on when data needs to be encrypted.</itunes:subtitle>
            <itunes:summary>While creating encrypted backup tapes is an excellent practice, for many organizations it is often the only time their data gets encrypted.  Patrick Townsend discusses some misconceptions he is seeing around encryption and tape backups, what organizations should be doing to secure their sensitive data before it gets backed up to tape, and what compliance regulations say on when data needs to be encrypted.</itunes:summary>
            <itunes:duration>16:49</itunes:duration>
            <itunes:keywords>tape encryption, key management, best practices, compliance, sensitive data</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>How LinkedIn Could Have Avoided a Breach</title>
            <description>LinkedIn recently experienced a data breach that exposed over 6.5 million hashed passwords.  While few details have been offered about the attack itself, LinkedIn could have avoided this breach if they had proper security processes in place.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/060812-Hash.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/060812-Hash.mp3" length="11172570" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">EF3764C2-D8E9-4366-A251-869110C6AABA-2405-000014596C2855D1-FFA</guid>
            <pubDate>Fri, 08 Jun 2012 14:17:01 -0700</pubDate>
            <itunes:subtitle>LinkedIn recently experienced a data breach that exposed over 6.5 million hashed passwords.  While few details have been offered about the attack itself, LinkedIn could have avoided this breach if they had proper security processes in place.</itunes:subtitle>
            <itunes:summary>LinkedIn recently experienced a data breach that exposed over 6.5 million hashed passwords.  While few details have been offered about the attack itself, LinkedIn could have avoided this breach if they had proper security processes in place.</itunes:summary>
            <itunes:duration>15:25</itunes:duration>
            <itunes:keywords>data, breach, hash, LinkedIn, security, password, sha-1, sha-256</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>System Logging on the IBM i - How to Do it Better</title>
            <description>Collecting and monitoring system logs has become a hot topic for organizations that need to meet compliance regulations.  Logging on the IBM i (AS/400) is different than other platforms and something an organization should not take the “do it yourself” approach.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/050112-logging-better.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/050112-logging-better.mp3" length="11162220" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">D17E4F4C-78B6-4503-BFCF-9BDB5DA32DC7-21138-000054C1A2D82ACB-FFA</guid>
            <pubDate>Tue, 01 May 2012 10:18:30 -0700</pubDate>
            <itunes:subtitle>Collecting and monitoring system logs has become a hot topic for organizations that need to meet compliance regulations.  Logging on the IBM i (AS/400) is different than other platforms and you should not take the “do it yourself” approach.</itunes:subtitle>
            <itunes:summary>Collecting and monitoring system logs has become a hot topic for organizations that need to meet compliance regulations.  Logging on the IBM i (AS/400) is different than other platforms and something an organization should not take the “do it yourself” approach.</itunes:summary>
            <itunes:duration>15:25</itunes:duration>
            <itunes:keywords>IBM, AS/400, system, logging, compliance, pci, hipaa, log, management</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Protect PHI &amp; Manage Risk - HIPAA Compliance</title>
            <description>The frequency of data breaches in healthcare have increased 32% in the past year and cost an estimated $6.5 billion annually. Fortunately, if you are protecting your Personal Health Information (PHI) with proper encryption and key management, you are exempt from a breach notification. &lt;br /&gt;
&lt;br /&gt;
Learn how ow a company can achieve Safe Harbor status in the event of a breach, as well as best practices for encryption, key management, and secure system logging.</description>
            <link>http://townsendsecurity.com/downloads/podcast/2012/041912-HIPAA-Risk.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2012/041912-HIPAA-Risk.mp3" length="14084082" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">BAD8E186-7B80-4916-8C90-9ADF9B890007-49955-000100BEBA83A915-FFA</guid>
            <pubDate>Thu, 19 Apr 2012 14:12:43 -0700</pubDate>
            <itunes:subtitle>Healthcare data breaches have increased 32% in the past year and cost an estimated $6.5 billion annually. Fortunately, if you are protecting your PHI with proper encryption and key management, you are exempt from a breach notification.</itunes:subtitle>
            <itunes:summary>The frequency of data breaches in healthcare have increased 32% in the past year and cost an estimated $6.5 billion annually. Fortunately, if you are protecting your Personal Health Information (PHI) with proper encryption and key management, you are exempt from a breach notification.

Learn how ow a company can achieve Safe Harbor status in the event of a breach, as well as best practices for encryption, key management, and secure system logging.</itunes:summary>
            <itunes:duration>19:28</itunes:duration>
            <itunes:keywords>manage, risk, HIPAA, HITECH, PHI, ePHI, encryption, key, management, safe, harbor, data, privacy, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>IBM i Security: Skip V6R1 and Upgrade to V7R1</title>
            <description>IBM recently announced the end of support date for V5R4.  This will prompt many IBM i shops to upgrade to a newer release - either V6R1 or V7R1.  This podcast will discuss the security reasons that you should go straight to V7R1.  Additionally, we will discuss how Townsend Security can help you take advantage of FIELDPROC, a new addition to V7R1 that allows companies to encrypt their sensitive data without changing their applications.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/031612-skip-V6R1.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/031612-skip-V6R1.mp3" length="10324013" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">992EFA2D-FD3C-404E-A157-04B7FEF0FFD7-43543-0001025918C662DC-FFA</guid>
            <pubDate>Fri, 16 Mar 2012 15:42:44 -0700</pubDate>
            <itunes:subtitle>IBM recently announced the end of support date for V5R4, which will prompt many IBM i (AS/400) shops to upgrade to either V6R1 or V7R1.  There are security reasons to go straight to V7R1. Also, learn how to encrypt data without changing your applications.</itunes:subtitle>
            <itunes:summary>IBM recently announced the end of support date for V5R4.  This will prompt many IBM i shops to upgrade to a newer release - either V6R1 or V7R1.  This podcast will discuss the security reasons that you should go straight to V7R1.  Additionally, we will discuss how Townsend Security can help you take advantage of FIELDPROC, a new addition to V7R1 that allows companies to encrypt their sensitive data without changing their applications.</itunes:summary>
            <itunes:duration>14:15</itunes:duration>
            <itunes:keywords>IBM i, AS/400, iseries, Automatic Encryption, FIELDPROC, V7R1, V5R4, V6R1, AES, encryption, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Secure Managed File Transfer on the IBM i - An Introduction</title>
            <description>Learn what secure managed file transfer is, how it can help you meet compliance regulations, and what to look for in a secure managed file transfer solution.  Additionally, we will discuss how Townsend Security can help make your managed file transfers secure with PGP encryption.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/030812-Managed-File-Transfer-Intro.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/030812-Managed-File-Transfer-Intro.mp3" length="12027214" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">FBD6AE74-188E-426C-ACA1-DFE3859C8ABF-57736-0000F48AC12927F8-FFA</guid>
            <pubDate>Thu, 08 Mar 2012 10:48:59 -0800</pubDate>
            <itunes:subtitle>Learn what secure managed file transfer is, how it can help you meet compliance regulations, and what to look for in a secure managed file transfer solution.  Additionally, learn how to make your managed file transfers secure with PGP encryption.</itunes:subtitle>
            <itunes:summary>Learn what secure managed file transfer is, how it can help you meet compliance regulations, and what to look for in a secure managed file transfer solution.  Additionally, we will discuss how Townsend Security can help make your managed file transfers secure with PGP encryption.

View our webcast on Managed File Transfer for even more information: http://bit.ly/zRFyUc </itunes:summary>
            <itunes:duration>16:42</itunes:duration>
            <itunes:keywords>managed file transfer, IBM i, AS/400, compliance, PCI, PGP, iSeries, linoma, go anywhere</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>System Logging on the IBM i: Getting Started</title>
            <description>Like other IT projects, the implementation of up-to-date logging requires careful planning.  For example: systems need to be monitored and the parameters related to security and archiving need to be defined.  &lt;br /&gt;
&lt;br /&gt;
This podcast discusses what system logging is, how logging can help you meet compliance requirements, and what to look for in a logging solution.  Additionally, learn how Townsend Security can help you transmit the logs from your IBM to any SIEM console.&lt;br /&gt;
</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2012/011012-IBM-i-logging.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2012/011012-IBM-i-logging.mp3" length="12287585" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">0B232A7E-8342-4ADE-B32B-9D56BB84B970-37662-0000C36032D20293-FFA</guid>
            <pubDate>Fri, 13 Jan 2012 09:57:35 -0800</pubDate>
            <itunes:subtitle>This podcast discusses what system logging is, how logging can help you meet compliance requirements, and what to look for in a logging solution.  Additionally, learn how Townsend Security can help you transmit the logs from your IBM to any SIEM console.</itunes:subtitle>
            <itunes:summary>Like other IT projects, the implementation of up-to-date logging requires careful planning.  For example: systems need to be monitored and the parameters related to security and archiving need to be defined.  

This podcast discusses what system logging is, how logging can help you meet compliance requirements, and what to look for in a logging solution.  Additionally, learn how Townsend Security can help you transmit the logs from your IBM to any SIEM console.
</itunes:summary>
            <itunes:duration>16:58</itunes:duration>
            <itunes:keywords>system logging, ibm i, as/400, iSeries, System i, compliance, PCI, SIEM, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>IBM i FIELDPROC Performance: Speed Matters</title>
            <description>FIELDPROC has made encryption on the IBM i much easier.  It is now possible to encrypt your databases with NO APPLICATION CHANGES!  The question is, what are the performance impacts?  &lt;br /&gt;
Patrick Townsend explains why the speed of your encryption is important, what to look for when deciding on a solution, and simple tests that listeners can do to help decide which FIELDPROC encryption solution is right for them.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2011/120211-FIELDPROC-Performance.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2011/120211-FIELDPROC-Performance.mp3" length="10340624" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">56187449-52E8-426F-8DA4-B45326F9671F-66451-0001B3B0876ED323-FFA</guid>
            <pubDate>Fri, 02 Dec 2011 09:48:33 -0800</pubDate>
            <itunes:subtitle>FIELDPROC has made encryption on the IBM i much easier.  It is now possible to encrypt your databases with NO APPLICATION CHANGES!  The question is, what are the performance impacts?</itunes:subtitle>
            <itunes:summary>FIELDPROC has made encryption on the IBM i much easier.  It is now possible to encrypt your databases with NO APPLICATION CHANGES!  The question is, what are the performance impacts?

Patrick Townsend explains why the speed of your encryption is important, what to look for when deciding on a solution, and simple tests that listeners can do to help decide which FIELDPROC encryption solution is right for them.</itunes:summary>
            <itunes:duration>14:16</itunes:duration>
            <itunes:keywords>transparent encryption, automatic encryption, ibm i, FIELDPROC, AES, Data Privacy, encryption, V7R1, linoma, AS400</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>HIPAA, HITECH Act, &amp; Encryption Key Management</title>
            <description>Today's topic is HPAA and the HITECH Act, and what they say about encryption and key management.  Additionally, learn how to avoid breach notifications and what Townsend Security can do to help your organization meet these compliance requirements.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2011/100411-HIPAA-HITECH.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2011/100411-HIPAA-HITECH.mp3" length="11466418" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">8ACCC6E5-DB24-423A-A101-8B2989B49BFD-15829-000065D7647537E8-FFA</guid>
            <pubDate>Tue, 04 Oct 2011 14:52:07 -0700</pubDate>
            <itunes:subtitle>Today's topic is HPAA and the HITECH Act, and what they say about encryption and key management.  Additionally, learn how to avoid breach notifications and what Townsend Security can do to help your organization meet these compliance requirements.</itunes:subtitle>
            <itunes:summary>Today's topic is HPAA and the HITECH Act, and what they say about encryption and key management.  Additionally, learn how to avoid breach notifications and what Townsend Security can do to help your organization meet these compliance requirements.</itunes:summary>
            <itunes:duration>15:55</itunes:duration>
            <itunes:keywords>HIPAA, HITECH, encryption, key, management, data, privacy, compliance, regulations, breach, notification</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption Key Management and Microsoft SQL Server 2008</title>
            <description>Learn about SQL Server 2008 EKM and what Microsoft customers should be thinking about when they consider using SQL Server EKM for encryption.  Also, learn what role a Hardware Security Module or HSM plays and what to look for when selecting an encryption key management HSM.</description>
            <link>http://townsendsecurity.com/downloads/podcast/2011/070111-encryption-key-management-SQL.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2011/070111-encryption-key-management-SQL.mp3" length="17403515" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">82607489-B007-4974-AF2B-78719E52C22D-49098-0001423B47110ECA-FFA</guid>
            <pubDate>Fri, 01 Jul 2011 10:13:21 -0700</pubDate>
            <itunes:subtitle>Learn about SQL Server 2008 EKM and what Microsoft customers should be thinking about when they consider using SQL Server EKM for encryption.  Also, learn what role an HSM plays and what to look for when selecting an encryption key management HSM.</itunes:subtitle>
            <itunes:summary>Learn about SQL Server 2008 EKM and what Microsoft customers should be thinking about when they consider using SQL Server EKM for encryption.  Also, learn what role a Hardware Security Module or HSM plays and what to look for when selecting an encryption key management HSM.</itunes:summary>
            <itunes:duration>24:05</itunes:duration>
            <itunes:keywords>encryption, key, management, microsoft, sql, 2008, compliance, r2, ekm, tde</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Emerging Data Privacy Regulations</title>
            <description>Organizations need to comply with a growing number of data privacy regulations.  Patrick discusses the various regulations - such as PCI, HIPAA/HITECH, and state privacy laws - as well as how to meet the regulations and what it is like to have an audit. </description>
            <link>http://townsendsecurity.com/downloads/podcast/2011/041211_Emerging-Data-Privacy-Regulations.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2011/041211_Emerging-Data-Privacy-Regulations.mp3" length="17605582" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">F202F59C-03DF-49B3-B24D-88A512922232-1665-00000B8590DD03A6-FFA</guid>
            <pubDate>Tue, 12 Apr 2011 11:41:08 -0700</pubDate>
            <itunes:subtitle>Organizations need to comply with a growing number of data privacy regulations.  Patrick discusses the various regulations - such as PCI, HIPAA/HITECH, and state privacy laws - as well as how to meet the regulations and what it is like to have an audit.</itunes:subtitle>
            <itunes:summary>Organizations need to comply with a growing number of data privacy regulations.  Patrick discusses the various regulations - such as PCI, HIPAA/HITECH, and state privacy laws - as well as how to meet the regulations and what it is like to have an audit. </itunes:summary>
            <itunes:duration>24:21</itunes:duration>
            <itunes:keywords>PCI, HIPAA, HITECH, SOX, GLBA, State Privacy, Encryption, Key Management, NIST, compliance, regulations, data privacy, audit</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Benefits of Transparent Encryption on IBM i</title>
            <description>Transparent encryption is new to IBM i 7.1. Learn about the new FieldProc capabilities and the benefits of transparent encryption, as well as what FieldProc is and isn’t.  Additionally, Patrick discusses the new security risks associated with the new FieldProc APIs and what Townsend Security is doing to help the people who have moved, or are thinking about moving to the latest IBM OS release.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2011/04052011V7R1.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2011/04052011V7R1.mp3" length="17256701" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">C48E7A1F-64D5-4F66-B599-A53571EEAEFA-22865-0000A13278D668EA-FFA</guid>
            <pubDate>Wed, 06 Apr 2011 09:56:35 -0700</pubDate>
            <itunes:subtitle>Learn about the new FieldProc capabilities in IBM i 7.1 and the benefits of transparent encryption. Additionally, Patrick discusses the security risks associated with the new FieldProc APIs and what Townsend Security is doing to help.</itunes:subtitle>
            <itunes:summary>Transparent encryption is new to IBM i 7.1. Learn about the new FieldProc capabilities and the benefits of transparent encryption, as well as what FieldProc is and isn’t.  Additionally, Patrick discusses the new security risks associated with the new FieldProc APIs and what Townsend Security is doing to help the people who have moved, or are thinking about moving to the latest IBM OS release.</itunes:summary>
            <itunes:duration>23:52</itunes:duration>
            <itunes:keywords>transparent encryption, automatic encryption, ibm i, FieldProc, AES, Data Privacy, encryption, V7R1, linoma, nubridges</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Key Management for Microsoft Windows</title>
            <description>Compliance regulations require proper key management.  Learn why encryption key management is a concern for Microsoft Windows users, some of the technical challenges in using good key management, and how Townsend Security can help Microsoft partners.</description>
            <link>http://townsendsecurity.com/downloads/podcast/2011/032511-key-management-windows.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2011/032511-key-management-windows.mp3" length="11031803" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">CF1077B0-9A47-437F-8A7C-D25FE8BF5FEF-22137-0000956BF3B65056-FFA</guid>
            <pubDate>Fri, 25 Mar 2011 08:54:27 -0700</pubDate>
            <itunes:subtitle>Compliance regulations require proper key management.  Learn why encryption key management is a concern for Microsoft Windows users, some of the technical challenges in using good key management, and how Townsend Security can help Microsoft partners.</itunes:subtitle>
            <itunes:summary>Compliance regulations require proper key management.  Learn why encryption key management is a concern for Microsoft Windows users, some of the technical challenges in using good key management, and how Townsend Security can help Microsoft partners.</itunes:summary>
            <itunes:duration>15:14</itunes:duration>
            <itunes:keywords>Microsoft, Windows, key, management, compliance, regulations, HSM, encryption, security, C#, VBNET, Java, Perl, FoxPro, Adobe Flex, COBOL, FIPS, .NET, SQL</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Data Privacy for the Non-Technical Person</title>
            <description>Learn what constitutes personally identifiable information (PII) and how to protect it with strong AES encryption and key management.  Additionally, learn about compliance regulations and how your organization can begin to develop a security policy.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2011/032111DPNonTech.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2011/032111DPNonTech.mp3" length="12183196" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">682D2C30-BA6B-4708-8DDC-A4D3154A1A27-11984-00005174FF1EB5BC-FFA</guid>
            <pubDate>Tue, 22 Mar 2011 08:43:48 -0700</pubDate>
            <itunes:subtitle>Learn what constitutes personally identifiable information (PII) and how to protect it with strong AES encryption and key management.  Additionally, learn about compliance regulations and how your organization can begin to develop a security policy.</itunes:subtitle>
            <itunes:summary>Learn what constitutes personally identifiable information (PII) and how to protect it with strong AES encryption and key management.  Additionally, learn about compliance regulations and how your organization can begin to develop a security policy.</itunes:summary>
            <itunes:duration>16:50</itunes:duration>
            <itunes:keywords>AES, encryption, key, management, PII, compliance, regulations, security, policy,</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>PCI DSS v2.0: Changes for Your Organization</title>
            <description>New PCI Data Security Standards have been announced. Patrick Townsend of Townsend Security, a PCI SSC participating organization, speaks on best practices for meeting PCI compliance regulations and provides insight and commentary on the changes in compliance and enforcement.</description>
            <link>http://townsendsecurity.com/downloads/podcast/2011/022411PCI-DSS-v2.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2011/022411PCI-DSS-v2.mp3" length="19529629" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">52AC5734-2E8D-4914-930F-48746F936D4A-21319-000064D7D708BCE7-FFA</guid>
            <pubDate>Thu, 24 Feb 2011 09:09:39 -0800</pubDate>
            <itunes:subtitle>New PCI Data Security Standards have been announced. Patrick Townsend CTO of Townsend Security, a PCI SSC participating organization, speaks on best practices and provides insight and commentary on the changes in compliance and enforcement.</itunes:subtitle>
            <itunes:summary>New PCI Data Security Standards have been announced. Patrick Townsend of Townsend Security, a PCI SSC participating organization, speaks on best practices for meeting PCI compliance regulations and provides insight and commentary on the changes in compliance and enforcement.</itunes:summary>
            <itunes:duration>27:02</itunes:duration>
            <itunes:keywords>PCI DSS, PCI SSC, Visa, key management, encryption, system logging, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Key Management Best Practices: What New PCI Regulations Say</title>
            <description>The new PCI Data Security Standards (PCI DSS v2.0) are here and we’ve gotten a lot of questions about the changes related to encryption key management. Because we work with a lot of companies going through PCI compliance audits and reviews, the new standards just confirm the trends we’ve seen over the last few months on how QSA auditors and security professionals view encryption key management, and what they see as the minimum requirements for managing keys.&lt;br /&gt;
&lt;br /&gt;
In this podcast, Patrick Townsend speaks on current best practices, as well as what PCI has to say about integrated key management (why it isn't a good thing), dual control, separation of duties, and split knowledge.</description>
            <link>http://townsendsecurity.com/downloads/podcast/2010/120310KeyManagement_BestPractices.mp3</link>
            <enclosure url="http://townsendsecurity.com/downloads/podcast/2010/120310KeyManagement_BestPractices.mp3" length="13845220" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">E5EE5768-916C-4D89-A528-DF2037E8FC35-15087-00005152439482C2-FFA</guid>
            <pubDate>Wed, 19 Jan 2011 09:11:17 -0800</pubDate>
            <itunes:subtitle>The new PCI Data Security Standards are here and we’ve gotten a lot of questions about the changes. Patrick speaks on best practices, as well as what PCI has to say about integrated key management, dual control, separation of duties, and split knowledge.</itunes:subtitle>
            <itunes:summary>The new PCI Data Security Standards (PCI DSS v2.0) are here and we’ve gotten a lot of questions about the changes related to encryption key management. Because we work with a lot of companies going through PCI compliance audits and reviews, the new standards just confirm the trends we’ve seen over the last few months on how QSA auditors and security professionals view encryption key management, and what they see as the minimum requirements for managing keys. 

In this podcast, Patrick Townsend speaks on current best practices, as well as what PCI has to say about integrated key management (why it isn't a good thing), dual control, separation of duties, and split knowledge.</itunes:summary>
            <itunes:duration>19:03</itunes:duration>
            <itunes:keywords>key management, encryption, PCI, data privacy, system logging, dual control, separation of duties, split knowledge, PCI DSS, PCI SSC, compliance, audit, QSA</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>The Data Protection Trifecta: Tokenization, Encryption, and Key Management</title>
            <description>Tokenization, Encryption, and Key Management are discussed and why each technology is a necessary component for a comprehensive data protection plan.  Additionally, Patrick discusses why NIST certification is important, as well as what VISA has to say regarding best practices with these technologies.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2010/081610_DataProtectionTrifecta.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2010/081610_DataProtectionTrifecta.mp3" length="20018683" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">1E8C6D52-8ADD-4B6F-AB68-27F045921301-5210-000018B2BF23557E-FFA</guid>
            <pubDate>Mon, 16 Aug 2010 15:44:02 -0700</pubDate>
            <itunes:subtitle>Tokenization, Encryption, and Key Management are discussed and why each technology is a necessary component for a comprehensive data protection plan.  Additionally, Patrick discusses VISA has to say regarding best practices.</itunes:subtitle>
            <itunes:summary>Tokenization, Encryption, and Key Management are discussed and why each technology is a necessary component for a comprehensive data protection plan.  Additionally, Patrick discusses why NIST certification is important, as well as what VISA has to say regarding best practices with these technologies.</itunes:summary>
            <itunes:duration>27:43</itunes:duration>
            <itunes:keywords>encryption, key management, tokenization, aes, Visa, Patrick Townsend, NIST, pci, best practices, compliance, data security, data protection</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Achieving Exemption from the HITECH Law</title>
            <description>HIPAA and HITECH are mandating encryption of sensitive medical and personal information. But all encryption is not created equal. Find out what NIST certification is, and how it gives you safe harbor status even if you experience a major data loss.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2010/050610_HITECH.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2010/050610_HITECH.mp3" length="12597073" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">6DEA090E-1806-493E-9537-679EFDCD1DF5-38073-000101BD1E70D86F-FFA</guid>
            <pubDate>Thu, 06 May 2010 15:06:18 -0700</pubDate>
            <itunes:subtitle>HIPAA and HITECH are mandating encryption of sensitive medical and personal information. But all encryption is not created equal. Find out what NIST certification is, and how it gives you safe harbor status even if you experience a major data loss.</itunes:subtitle>
            <itunes:summary>HIPAA and HITECH are mandating encryption of sensitive medical and personal information. But all encryption is not created equal. Find out what NIST certification is, and how it gives you safe harbor status even if you experience a major data loss.</itunes:summary>
            <itunes:duration>17:24</itunes:duration>
            <itunes:keywords>NIST, AES, encryption, HITECH, HIPAA, PII, data protection, certified, Patrick townsend</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>The Many Flavors of Data Protection: Deciding What’s Right for Your IBM i Enterprise</title>
            <description>Patrick Townsend discusses data security and the technologies available to protect your IBM i – from tokenization to various types of encryption. You’ll discover the uses for each, and which best fit your data protection strategy. Includes tips on choosing the right technology.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2010/032910_ManyFlavorsProtection.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2010/032910_ManyFlavorsProtection.mp3" length="14975149" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">774F5D0F-AF30-44C2-81CD-72A1BAE054C3-936-00000B4F5217BDEF-FFA</guid>
            <pubDate>Mon, 29 Mar 2010 14:07:49 -0700</pubDate>
            <itunes:subtitle>Patrick Townsend discusses data security and the technologies available to protect your IBM i – tokenization to encryption. You’ll discover the uses for each, and which best fit your data protection plan. Includes tips on choosing the right technology.</itunes:subtitle>
            <itunes:summary>Patrick Townsend discusses data security and the technologies available to protect your IBM i – tokenization to encryption. You’ll discover the uses for each, and which best fit your data protection plan. Includes tips on choosing the right technology.</itunes:summary>
            <itunes:duration>20:43</itunes:duration>
            <itunes:keywords>encryption, key management, tokenization, aes, pgp, Patrick Townsend, NIST, pci, hipaa, sox, compliance, data security, data protection</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>The Business Case for Tokenization</title>
            <description>Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/122909_BusinessTokenization.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/122909_BusinessTokenization.mp3" length="15213602" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">BF767B37-B7B4-40C0-B728-617BC84295EA-12037-00005E220DF5B534-FFA</guid>
            <pubDate>Tue, 29 Dec 2009 13:00:15 -0800</pubDate>
            <itunes:subtitle>Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.</itunes:subtitle>
            <itunes:summary>Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.</itunes:summary>
            <itunes:duration>21:02</itunes:duration>
            <itunes:keywords>data security, encryption, tokenization, privacy, compliance, nist, pci regulations, pci audit, patrick townsend, enterprise, level 2 merchant, credit card, hipaa, sox, Sarbanes-Oxley</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Data Tokenization: Separating Fact from Myth</title>
            <description>Tokenization is a hot topic in data security and the payment card industry today. But there is misinformation in the marketplace. Patrick Townsend talks about what tokenization is and is not, and offers advice on how it can help you comply with data security regulations. </description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/102709Tokenization.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/102709Tokenization.mp3" length="14443710" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">53A54BD4-8598-4186-A6BC-8CF7FE700FA6-15279-0000671AB1A81487-FFA</guid>
            <pubDate>Tue, 27 Oct 2009 15:51:48 -0700</pubDate>
            <itunes:subtitle>Tokenization is a hot topic in data security and the payment card industry. But there is misinformation in the marketplace. Patrick Townsend talks about what tokenization is and is not, and offers advice on how it can help you compliance.</itunes:subtitle>
            <itunes:summary>Tokenization is a hot topic in data security and the payment card industry today. But there is misinformation in the marketplace. Patrick Townsend talks about what tokenization is and is not, and offers advice on how it can help you comply with data security regulations. </itunes:summary>
            <itunes:duration>19:58</itunes:duration>
            <itunes:keywords>data security, encryption, key management, nist, pci regulations, pci audit, aes, pgp, patrick townsend, enterprise, level 2 merchant, credit card, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>PCI &amp; the Audit: What Mid-Size Companies Need to Know</title>
            <description>Level 2 merchants are about to be put under the PCI audit microscope. Patrick Townsend gives a brief overview about what this means to your business, plus how and when to prepare for this and other pending regulatory changes.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/081109PCI.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/081109PCI.mp3" length="10097199" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">87620DDD-E3AB-4C58-B8DC-29A5520BA1E0-6606-0000594DC38E6702-FFA</guid>
            <pubDate>Wed, 12 Aug 2009 13:33:00 -0700</pubDate>
            <itunes:subtitle>Level 2 merchants are about to be put under the PCI audit microscope. Patrick Townsend gives a brief overview about what this means to your business, plus how and when to prepare for this and other pending regulatory changes.</itunes:subtitle>
            <itunes:summary>Level 2 merchants are about to be put under the PCI audit microscope. Patrick Townsend gives a brief overview about what this means to your business, plus how and when to prepare for this and other pending regulatory changes.</itunes:summary>
            <itunes:duration>13:56</itunes:duration>
            <itunes:keywords>data security, encryption, key management, nist, pci regulations, pci audit, aes, pgp, patrick townsend, enterprise, level 2 merchant, credit card, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Secure File Transfer Changes for the IBM i</title>
            <description>A discussion of existing and new regulations that are changing the way System i users handle secure file transfer.  Also includes information about solutions available to help the Enterprise meet today’s compliance challenges.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/071009_SecureTransfer.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/071009_SecureTransfer.mp3" length="13115089" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">EDFF795B-BB28-422C-AC17-84E88641B4B4-258-00000393EE400353-FFA</guid>
            <pubDate>Tue, 14 Jul 2009 10:26:03 -0700</pubDate>
            <itunes:subtitle>A discussion of existing and new regulations that are changing the way System i users handle secure file transfer.  Also includes information about solutions available to help the Enterprise meet today’s compliance challenges.</itunes:subtitle>
            <itunes:summary>A discussion of existing and new regulations that are changing the way System i users handle secure file transfer.  Also includes information about solutions available to help the Enterprise meet today’s compliance challenges.</itunes:summary>
            <itunes:duration>18:05</itunes:duration>
            <itunes:keywords>Townsend, data security, encryption, PGP, AES, system i, IBM i, AS400, PCI, Sarbannes-Oxley, SOX, HIPAA, Massachusetts, MA privacy law, MA 201 CMR 17.00, WISP</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>The Government's Growing Role in Data Security</title>
            <description>More and more government agencies are getting involved in data security and encryption. NIST powers are on the rise, and more stringent state and federal legislation is driving businesses large and small to invest in data security. Find out why, and what this means to the future of data encryption.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/062509AES.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/062509AES.mp3" length="14641662" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">F2F6A9C6-5E60-4F8D-96E2-A9EC2C9652BE-26163-0000D7C1E99E83D4-FFA</guid>
            <pubDate>Fri, 26 Jun 2009 09:02:57 -0700</pubDate>
            <itunes:subtitle>More government agencies are getting involved in data security. NIST powers are growing, and more strict state and federal laws are driving businesses to invest in encryption. Find out why, and what this means for the future of data encryption.</itunes:subtitle>
            <itunes:summary>More government agencies are getting involved in data security. NIST powers are growing, and more strict state and federal laws are driving businesses to invest in encryption. Find out why, and what this means for the future of data encryption.</itunes:summary>
            <itunes:duration>20:12</itunes:duration>
            <itunes:keywords>data security, encryption, nist, pci, hipaa, sox, aes, patrick townsend, enterprise, compliance, data security, pgp</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>XML in Tough Times</title>
            <description>Townsend CEO discusses XML and web services for the IBM i. Includes case studies of Pottery Barn and Bass Pro Shops. They increased revenue &amp; decreased costs, your Enterprise can too.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/060309XMLinToughTimes.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/060309XMLinToughTimes.mp3" length="10571574" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">570A6743-B78F-459E-86F4-ED2B6CE78779-3270-0000647DA42DF405-FFA</guid>
            <pubDate>Wed, 03 Jun 2009 15:28:31 -0700</pubDate>
            <itunes:subtitle>Townsend CEO discusses XML and web services for the IBM i. Includes case studies of Pottery Barn and Bass Pro Shops. They increased revenue &amp; decreased costs, your Enterprise can too.</itunes:subtitle>
            <itunes:summary>Townsend CEO discusses XML and web services for the IBM i. Includes case studies of Pottery Barn and Bass Pro Shops. They increased revenue &amp; decreased costs, your Enterprise can too.</itunes:summary>
            <itunes:duration>14:33</itunes:duration>
            <itunes:keywords>data security, encryption, pci, hipaa, sox, XML, aes, pgp, key management, patrick townsend, enterprise, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Encryption Key Management</title>
            <description>Encryption Key ManagementEncryption key management is in the spotlight thanks to auditors and pending laws. Get key manager basics, and tips for evaluating a solution for your Enterprise.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/052709_KeyManagement.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/052709_KeyManagement.mp3" length="12906928" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">9E818230-09BE-49F5-9C4A-25653CB74A5A-4153-00009DB845C2A050-FFA</guid>
            <pubDate>Tue, 02 Jun 2009 09:03:32 -0700</pubDate>
            <itunes:subtitle>Encryption key management is in the spotlight thanks to auditors and pending laws. Get key manager basics, and tips for evaluating a solution for your Enterprise.</itunes:subtitle>
            <itunes:summary>Encryption key management is in the spotlight thanks to auditors and pending laws. Get key manager basics, and tips for evaluating a solution for your Enterprise.</itunes:summary>
            <itunes:duration>17:48</itunes:duration>
            <itunes:keywords>data security, encryption, pci, hipaa, sox, Sarbanes-oxley, aes, pgp, key management, patrick townsend, enterprise, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>RSA &amp; COMMON Expo Recap</title>
            <description>This interview with Patrick Townsend of Patrick Townsend Security Solutions recaps his experiences at the recent RSA and Common 2009 Expos. The podcast serves as a wrap-up of the tradeshows and highlights significant developments in data security, encryption, and key management.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/051109_Trade_Show_Recap.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/051109_Trade_Show_Recap.mp3" length="9072711" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">2B26E485-8540-4262-895B-EE54D18D73D7-3472-0000636AE2CDF407-FFA</guid>
            <pubDate>Tue, 12 May 2009 14:59:33 -0700</pubDate>
            <itunes:subtitle>This interview with Patrick Townsend recaps his experiences at the recent RSA and Common 2009 Expos. The podcast serves as a wrap-up of the tradeshows and highlights significant developments in data security, encryption, and key management.</itunes:subtitle>
            <itunes:summary>This interview with Patrick Townsend recaps his experiences at the recent RSA and Common 2009 Expos. The podcast serves as a wrap-up of the tradeshows and highlights significant developments in data security, encryption, and key management.</itunes:summary>
            <itunes:duration>12:30</itunes:duration>
            <itunes:keywords>data security, encryption, pci, hipaa, sox, #RSA09, aes, pgp, key management, patrick townsend, enterprise, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Massachusetts Privacy Law - 2010</title>
            <description>The Massachusetts Privacy law goes into effect January 1, 2010. Find out how it will affect your Enterprise and your IT infrastructure in this conversation with the President and CEO of Patrick Townsend Security Solutions.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/042909_MA_Privacy.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/042909_MA_Privacy.mp3" length="8341089" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">D047DF00-4310-4B48-8BC7-A87C75E58183-154-000001AB073C050B-FFA</guid>
            <pubDate>Thu, 30 Apr 2009 12:25:31 -0700</pubDate>
            <itunes:subtitle>The Massachusetts Privacy law goes into effect January 1, 2010. Find out how it will affect your Enterprise and your IT infrastructure in this conversation with the President and CEO of Patrick Townsend Security Solutions.</itunes:subtitle>
            <itunes:summary>The Massachusetts Privacy law goes into effect January 1, 2010. Find out how it will affect your Enterprise and your IT infrastructure in this conversation with the President and CEO of Patrick Townsend Security Solutions.</itunes:summary>
            <itunes:duration>11:30</itunes:duration>
            <itunes:keywords>data security, encryption, pci, hipaa, sox, Sarbanes-oxley, aes, pgp, key management, patrick townsend, enterprise, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

        <item>
            <title>Intro to Patrick Townsend and His Company</title>
            <description>An introduction to Patrick Townsend Security Solutions by the company’s President &amp; CEO Patrick Townsend. This interview covers the company’s origins, its current focus, and what's on the horizon for the data security industry.</description>
            <link>http://www.townsendsecurity.com/downloads/podcast/2009/042909_CompanyIntro.mp3</link>
            <enclosure url="http://www.townsendsecurity.com/downloads/podcast/2009/042909_CompanyIntro.mp3" length="5645573" type="audio/mpeg"  ></enclosure>
            <guid isPermaLink="false">C001B7FF-87A1-41AB-8640-8B1D58F9DE4C-154-0000016BA9A9D75B-FFA</guid>
            <pubDate>Thu, 30 Apr 2009 12:20:59 -0700</pubDate>
            <itunes:subtitle>An introduction to Patrick Townsend Security Solutions by the company’s President &amp; CEO Patrick Townsend. This interview covers the company’s origins, its current focus, and what's on the horizon for the data security industry.</itunes:subtitle>
            <itunes:summary>An introduction to Patrick Townsend Security Solutions by the company’s President &amp; CEO Patrick Townsend. This interview covers the company’s origins, its current focus, and what's on the horizon for the data security industry.</itunes:summary>
            <itunes:duration>7:45</itunes:duration>
            <itunes:keywords>data security, encryption, pci, hipaa, sox, Sarbanes-oxley, aes, pgp, key management, patrick townsend, enterprise, compliance</itunes:keywords>
            <itunes:author>Townsend Security</itunes:author>
            <itunes:explicit>no</itunes:explicit>
        </item>

    </channel>
</rss>
