enterprisesecuritymag

android

Android in Enterprise BYOD
Enterprisesecuritymag >> cxoinsights

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

Cyber Attacks to Watch out for in 2019
Enterprisesecuritymag >> cioviewpoint

Cybersecurity witnessed a rapid multiplication of high-profile breaches and phishing attacks and in 2019 there may be the more of same.  The companies must secure their privileged accounts, eliminate excessive user privileges, prioritize...

The Challenges of Online Payments
Enterprisesecuritymag >> cxoinsights

As technology advances in smartphones and e-wallets; purchase patterns change, and demand for cross-border multi-currency electronic payments increase, providers are under pressure to provide peer-to-peer payments beyond traditional banking...

Integrating Drones into the Most Complex Airspace in the World
Enterprisesecuritymag >> cxoinsights

Sean S Torpey, Director of Infrastructure and Operations, FAA

Every day, more than 2 million passengers and 50,000 tons of cargo fly on 27,000 commercial flights within 5 million square miles of U.S. airspace. At any given time, roughly 7,000 pilots are airborne in aircrafts of different shapes and...

Securing Mobile Devices with Advanced Hardware Technology
Enterprisesecuritymag >> csoinsight

Though highly advanced in some of the aspects, mobile software protection is nearing its limit. Because this form of security is based on a software protecting another software, it somehow fails to be as reliable as hardware-backed protection....

The Next Phase of Video Surveillance
Enterprisesecuritymag >> csoinsight

A video surveillance system has become an inevitable part of most businesses today to keep an eye on the events and happening in the workplace. Many business owners today need the convenience and ease of viewing live video even while they are away...

Pushing the Needle of Innovation in Banking
Enterprisesecuritymag >> csoinsight

Jojo Seva, CIO, NEFCU

Technology and NEFCU NEFCU is in a transformational phase where we intend to leverage existing and emerging technologies to be more strategic. For me, the essence of strategy is to create competitive advantage. Simply having a technology...

Is Your Corporation Suffering From 'Data Sprawl'?
Enterprisesecuritymag >> cioviewpoint

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3 Information today moves at a breakneck speed and the amount of data produced worldwide every day is staggering. With each new device and system added to a network, a...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >> cxoinsights

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...

Rethinking Security and Privacy in the Era of Empowered Digital Users
Enterprisesecuritymag >> cxoinsights

Scott A. Snyder, President & Chief Strategy Officer, Mobiquity, Robert McCarthy, Principal Technical

In 2007, Steve Jobs unveiled the iPhone, ushering in a new wave of high-end smartphones and native “apps”. Within a year, Google followed suit with the introduction of the Android operating system, an open OS powering a consortium of...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> csoinsight

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> csoinsight

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

"Corporate Considerations: Dispelling the Myths of Cyber Security"
Enterprisesecuritymag >> vendor

Neil Jarvis, CIO, Fujitsu America, Inc.

In the blockbuster hit, “Skyfall,” James Bond’s mission is to find and stop Raoul Silva, a former British agent who felt betrayed by “M” and his government. As it goes, he decides to take revenge by stealing critical...

The Emerging Threat of Hacking-as-a- Service
Enterprisesecuritymag >> vendor

Ondrej Krehel, MD & Founder, LIFARS

It’s not uncommon for CEOs and other C-level executives to view spending on IT infrastructure and cybersecurity as a necessary evil, while speaking very proudly of security efforts and roadmaps. Falsely believing that the dangers...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >> vendor

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...

Rethinking Security and Privacy in the Era of Empowered Digital Users
Enterprisesecuritymag >>

Scott A. Snyder, President & Chief Strategy Officer, Mobiquity, Robert McCarthy, Principal Technical

In 2007, Steve Jobs unveiled the iPhone, ushering in a new wave of high-end smartphones and native “apps”. Within a year, Google followed suit with the introduction of the Android operating system, an open OS powering a consortium of...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >>

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Kiana.io: Enhancing Threat Analysis with IoP (Internet of People)
Enterprisesecuritymag >>

Nader Fathi, CEO

Kiana Analytics is a threat management solutions company that simplifies the discovery and identification of malicious individuals. They are a complete and secure cloud-based big data analytics. Kiana Analytics provides its customers with real...

TEHTRIS: Holistic Cybersecurity with Enhanced Endpoint Protection
Enterprisesecuritymag >>

Laurent Oudot, Co-CEO and CTO

TEHTRIS is a France-based cybersecurity solution provider which is specialized in cutting-edge IT security technologies. The company provides resources required to counter the present threats faced by businesses by understanding the methods and...

Appknox: Proactive Security
Enterprisesecuritymag >>

Prateek Panda, Co-Founder & CMO

Appknox is a prominent vulnerability management solution provider that provides mobile application security testing services to build a safe and secure mobile ecosystem using a system plus a human approach to outsmart hackers. The rapid growth of...