Weekly Newsletter Signup | Enterprise Security Mag


Weekly Brief


Thursday, May 12,2022

Feature of the Week

Almost every organization faces a rapid increase in the number of endpoints connected to its network today.  Read more
The nature of the attacks and the identity of the threat actors who may be abusing the Print Spooler flaw is unclear to avoid further exploitation by hacker teams.  Read more
These factors have contributed to the current emphasis on evaluating and managing organizational risk, which is anticipated to continue and intensify over the next year.  Read more

CIO Viewpoint

By Yonesy Núñez, Chief Information Security Officer, Jack Henry & Associates  
By Bernard Gavgani, Group CIO, BNP Paribas  
For every lock, there is someone either trying to pick it or break in. But, if the lock is made so strong,  Read more

Featured Vendors

By Andrew Martin, CEO  
ControlPlane assists customers implementing secure, zero-trust platforms and infrastructure using SPIFFE and SPIRE technologies.They provide industry-leading expertise in building, deploying, and maintaining high compliance Kubernetes andcloud...   Read more
By Keith Chval, President and CEO  
Protek International provides top-quality digital forensics services to its clients. The company's deep expertise and in-the-cyber-trenches experience are rivaled by very few in the market and surpassed by none. Throughout Protek’s continuous...   Read more

CXO Insights

By Brenden Smith, CISO, FirstBank  
The single most important factor in adopting Agile practices in your security team is the willingness to continuously improve what you try. You don’t need expertise, certifications, or a Scrum expert to move forward  Read more
By Erik Hart, Chief Information Security Officer, Cushman & Wakefield  
As the world adapts to the new “normal,” we know for sure that technology will impact our lives more than ever. Look no further than the rapid expansion of mobile applications for things like health checks  Read more