enterprisesecuritymag

Weekly Brief

Subscribe

Friday, November 27,2020

Feature of the Week

As the security threats across networks increase, more and more businesses are applying threat management software so that it becomes easy for them to manage the data and other sensitive information securely from cybercriminals.  Read more
Recent growth in access control cards is the smart card. In contrast to the proximity card, which presents minimal security, or the swipe card easily copied, the smart card offers advanced protection  Read more
The performance analytics content packs have some of the preconfigured best practice dashboards. The dashboards represent the crucial metrics necessary for analyzing the vulnerability response process, like viewing remediation target attainment rates  Read more

CIO Viewpoint

By Leon Ravenna, CISO, KAR Auction Services, Inc.  
Customer Compliance is often considered the primary driver of cybersecurity and privacy programs.  Read more
By Dr. Kevin Jones, Global Chief Information Security Officer, Airbus  
A recognized expert in Cyber Security across multiple domains and platforms.  Read more

Featured Vendors

By JeungGyun-tae, CEO  
Mirae Technology is an authentication solution company in the Republic of Korea that develops and supplies two-factor authentication solutions such as OTP and biometric authentication. The company’s range of offerings include authentication...   Read more
By Malcolm Harkins, Chief Security and Trust Officer  
Cymatic offers the only all-in-one web security platform that delivers confidence across devices, credentials, and users. It autonomously identifies and verifies a user’s security hygiene and blocks threats at the browser. Delivered through an...   Read more
By Marvin Wheeler, CEO  
Cybraics empowers enterprises to harness the power and scale of big-data security analytics with their advanced AI-based threat detection.Developed out of a long-term award-winning government research program designed to support the war on...   Read more

CXO Insights

By Keith Engelbert, Chief Technology Officer, Student Transportation of America  
The good news is there is an entire new breed of cyber products and services to filling the gaps for an organization’s security strategy.  Read more
By Ben Schoenecker, Director of Information Security at Hendrick Automotive Group  
A shift to the cloud results in less infrastructure. This is a clear advantage to most organizations, since eliminating a costly hardware lifecycle on hundreds of SIEM appliances is a big win for the budget.  Read more