enterprisesecuritymag

IBM Security: Commoditizing Threat Intelligence

IBM Security: Commoditizing Threat Intelligence

Marc van Zadelhoff, General Manager,IBM Security

Axiom Cyber Solutions: The First Line of Defense and Last

Shannon Wilkinson, President and Troy Wilkinson, CEO,Axiom Cyber Solutions

Higher Education Challenges: Big Data; Cloud Computing; Information Security

Higher Education Challenges: Big Data;...

Elias G. Eldayrie, VP & CIO, University of Florida

Smart Phones Have Not So Smart Security

Smart Phones Have Not So Smart Security

Dan Ross, President & CEO, Promisec

Analytical Security: Data-driven analytics and a new information security paradigm

Analytical Security: Data-driven...

John Beeskow, EVP of IT & Security Strategy, CBI

So What Does General Counsel Have to Do with Cyber-Security, Anyway?

So What Does General Counsel Have to Do...

Ronald Sarian, VP and General Counsel, eHarmony

Security: Most Demanding Concern in This New World of IT

Security: Most Demanding Concern in This New World of IT

Federico Flórez, Chief Information & Innovation Officer, Ferrovial

Data Security across the Enterprise

Kas Nader, CIO & SVP of Global Technology, Atlanticus Holding

Developing Technology to  Address Big Data and  Cyber-Security Challenges

Developing Technology to Address Big...

Paul Liebman, CCO, The University of Texas at Austin

A New Vocabulary for the Digital Age

A New Vocabulary for the Digital Age

Trevor Hughes, CEO and President, International Association of Privacy Professionals

Security and Privacy: Stop Plotting Against Each Other

Security and Privacy: Stop Plotting...

Ruby Zefo, VP, Law and Policy Group, Intel Corporation

Big Data Analysis and Thought Diversity: Lessons From Anscombe's Quartet

Big Data Analysis and Thought...

Aaron Ferguson, Technical Director-Cyber & Information Analytics Office, National...