enterprisesecuritymag

application

CIOs Shouldn't See OpenStack and Public Clouds as an Either/Or Proposition
Enterprisesecuritymag >> cioviewpoint

Shelton Shugar, CIO, Barclaycard [NYSE:BCS-D]

With over 20+ million lines of codes and over 30,000 people in the community, OpenStack has easily gained adoption across a variety of industries and proved its viability and reliability for production environments. It has become the fastest...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

How Do We Know We're Secure?
Enterprisesecuritymag >> cioviewpoint

Joshua Danielson, Chief Information Security Officer, Copart [NASDAQ:CPRT]

How do we know we’re secure?” It’s a question I’ve been asked by senior leadership at every organization I’ve been. I typically reply “how do you guarantee you won’t get into an accident this...

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >> cxoinsights

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >> cxoinsights

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

Cloud Management Platforms that are Spearheading Innovation
Enterprisesecuritymag >> cxoinsights

Cloud management platforms are technologies utilized to operate and monitor data, services, and applications on the cloud. In determining the most efficient cloud management software, a number of features, such as flexibility, security,...

Understanding the Significance of Payment Security
Enterprisesecuritymag >> cioviewpoint

With frequent and high-level transactions taking place on a wider platform, and with globalization further leveraging the payment society, the need for payment security check is essential. Newer transaction facilities through mobile and other...

Understanding The New Endpoint Security Features For Your Enterprise
Enterprisesecuritymag >> cxoinsights

Enterprise IT security teams subjects to approximately  5,000 to 7,000 software vulnerabilities per year. Security personnel has to assess their organization's digital assets, evaluate their competitors' motives and strategies and be...

Achieving Information Security in Healthcare
Enterprisesecuritymag >> cioviewpoint

Dan Costantino, CISO, Penn Medicine

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs on a continual basis as it matures. It is critical to scrutinize whether you have...

The Arising Need for Shift Left Security
Enterprisesecuritymag >> cioviewpoint

The growing culture in organizations to take an agile and DevOps approach to software application development is due to the ever-increasing dependency on software. In order to meet demands for a faster time to market, developers now play an active...

SophiaTX Launches Enterprise-Ready Public Blockchain
Enterprisesecuritymag >> cxoinsights

Switzerland – SophiaTX successfully launched its mainnet with the primary purpose of creating a public blockchain with features and capabilities suitable for enterprise use.  With its fast and secure...

Cybersecurity Strategy - Do You Have One Yet?
Enterprisesecuritymag >> cxoinsights

Dina Moskowitz, CEO and Founder, SaaSMAX Corp

Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats,...

Overcoming Enterprise Security Challenges with Continuous Monitoring in the Cloud
Enterprisesecuritymag >>

Sumedh Thakar, Chief Product Officer, Qualys

Across industries, organizations are realizing that traditional methods of security no longer stack up against today’s constantly evolving cyber threats. In addition, these tools often limit organizations’ ability to scale. With the...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >>

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

Enterprise Architecture and Culture: Two Parts of Digital Transformation Success
Enterprisesecuritymag >>

Ethan Pack, Director of Enterprise Architecture and Applications, TDECU

“We really need a digital transformation strategy.” A version of that phrase can be heard coming from many boardrooms and executive teams around the world. Digital business is quite the buzzphrase these days and why shouldn’t it...

Five Predictions that can change the phase of cyber security in 2018
Enterprisesecuritymag >>

Cyber security is a topic that is increasingly receiving an awful lot of attention. Especially since the world we live in has companies storing their data in the cloud and depends on networking systems. Generally, when talking about the latest...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >>

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Integrating Cloud Capability To Provide Reliability, Authentication, And Messaging Infrastructure
Enterprisesecuritymag >>

Kim Tracy, CIO, Northeastern Illinois University

Infrastructure To Tackle The Onslaught Of Digital Content And Mobile Devices In being a public university, we look for investments in IT infrastructure that we believe will definitely be of value. Of the key parameters I look at the future...

Combating Organizational Financial Risks
Enterprisesecuritymag >>

Cris Luce, CMO/CTO, Accuro AgriServices

The modern world is defined, in large part, by electronic communication and the massive storage and exchange of digital information. While the Internet and other systems allow companies to operate on a global basis and enable geographically...

Transforming Your Business through Secure Mobile Strategies
Enterprisesecuritymag >>

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung All too often, I see organi­zations that are looking to improve their mo­bile strategies fall into the same patterns and quicksand in these efforts....