image for newsletter
A weekly summary of the news, trends, reviews, profiles and articles from Enterprise Security Mag
April 17, 2019

Enterprise Security Mag Weekly Brief

Newsletter for Enterprise Technology Decision Makers

Feature of the Week
Invasive attacks can only be possible if the chip surface is exposed to the attackers. Attackers can manipulate chip physically to extract vital information stored in the chip.
The increasing reliance on technology is making it more and more essential to secure every aspect of online data. As the internet evolves and the network grows in size, data integrity remains a concern for businesses.
Modern lifestyle is creating information glut. Brands are fetching customer data from all possible sources to deliver a personalized experience to each of its customers.
Featured Vendors
Provides services to protect against targeted and under-the-radar attacks using self-learning, behavioral anomaly detection algorithms.
Offers services ranging from strategic security advisory to SWAT-team remediation projects to help companies understand their risks, create policies for a target end state, and remediate major vulnerabilities.
Access governance solutions that automate the lifecycle of identities and entitlements.
CIO Viewpoint
Whitney Kellett, CIO, Aqua America [NYSE:WTR]
At the heart of all technology based decisions is the need to manage and protect company assets.
Paige Adams, Group CISO, Zurich Insurance Group
As a company with long standing European roots, we believe apprenticeships are a vital and often underused tool to attract and train fresh talent.
CXO Insights
By Mike Fucci, Chairman of the Board, Deloitte
Chief digital officer, chief data officer and chief automation officer are just a few of the emerging titles that are more common in today’s marketplace.
By Joel White, CPA, CGMA, CISA, CIA, CFE, Senior Director – Internal Audit, Risk & Compliance, Association of International Certified Professional Accountants
A strong cybersecurity risk management program will prevent attacks from taking place, detect attacks sooner, help respond to and recover from attacks more quickly, and will go a long way in describing what exactly it is that you do.