enterprisesecuritymag

Weekly Brief

Subscribe

Weekly Brief

Thursday, October 10,2019

Feature of the Week

Percentage-based URL encoding is a new technique adopted by Phishers to escape detection by secure email gateways.  Read more
Investigation for cyber attacks, data breaches, and more becomes complex when data sources are not connected on a single platform.  Read more
SOCKs5 is the best option to unblock the internet and setting it up is super easy whether one needs to access restricted content or download torrents.  Read more

CIO Viewpoint

By Tim Ramsay, CISO & AVP, University of Miami  
How does a Chief Information Security Officer demonstrate effectiveness? When the opportunity arises, in the elevator or in the boardroom, every CISO must be prepared to answer the question: “How secure are we?  Read more
By Mark Morrison, Chief Information Security Officer, OCC  
CISOs should instead be concentrating on the integration of security capabilities to achieve business objectives while operating in a risk-acceptable environment.  Read more

Featured Vendors

By Aiert Azueta Dudagoitia, Founder & CEO  
Offers advanced IT solutions—including infrastructure and applications, data management, and IAM and PAM—for customers in the public and private sector across the EMEA region  Read more
By Jens Björkman, CEO  
Helping companies enhance their IAM framework and spread awareness toward the overall influence of effective identity and access control for a business success  Read more
By Szabolcs Vida, Managing Director  
Specialises in networking, identity and access management, IT security, Microsoft infrastructures, virtualisation, outsourcing, and cybersecurity  Read more

CXO Insights

By Diane Joyce, Identity Management Consultant/Enterprise and Solution Architect/Information Architect, Matakite  
Applying AI to SIEM and IDAM together is arming the sentinel with advanced weapons in the fight against cybercrime.  Read more
By Lishoy Francis, Senior Consultant, Consult Hyperion  
Increasingly IoT devices will be autonomous, directly accessing other systems.  Read more