enterprisesecuritymag

Why Offensive Countermeasures Weaken Our Cybersecurity

Why Offensive Countermeasures Weaken Our Cybersecurity

Nuala O’Connor, President & CEO, Center for Democracy & Technology

Emerging Tech Challenges in Legal: Data Insecurity as an Unfair Business Practice

Lisa LaForge, Director-Technology Transactions & Chairperson of the Open Source Steering Committee,

Palindrome Technologies: Security at Your Fingertips

Peter Thermos, CEO,Palindrome Technologies

Productivity and Security-Can you ever have both?

Productivity and Security-Can you ever...

Julie Cullivan, SVP Business Operations & CIO, FireEye

Creating a Culture of Security

Creating a Culture of Security

Lyle Hardy, Global CIO, Teleperformance

Amaryllis - Modular Payments Platform: Complete End-to-End Platform

Amaryllis - Modular Payments Platform:...

Mark A. Bishopp, CEO,Amaryllis

Security and Privacy: Stop Plotting Against Each Other

Security and Privacy: Stop Plotting...

Ruby Zefo, VP, Law and Policy Group, Intel Corporation

Gearing up To Protect against Security Breaches

Gearing up To Protect against Security Breaches

Paul Leury, CIO, & David Mason, Director, The Boon Group

Biometric Signature-ID: Advanced Biometrics for Foolproof Authentication

Jeff Maynard, CEO, President, & Founder,Biometric Signature ID

Countering Cyber Vulnerabilities & Threats

Roota Almeida, CISO, Delta Dental of New Jersey

ULedger: Modernizing IT Infrastructure through Blockchain

ULedger: Modernizing IT Infrastructure...

Josh McIver, Founder & CEO ,ULedger

Scaling Your Application Security Program

Scaling Your Application Security Program

Chris Wysopal, Co-Founder, CTO & CISO, Veracode

Five Enterprise IT Security Stats That May Surprise You

Five Enterprise IT Security Stats That...

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Cognistx and Kroll: AI-Enabled Data Breach Detection

Cognistx and Kroll: AI-Enabled Data...

Sanjay Chopra, CEO, Cognistx,Cognistx and Kroll