enterprisesecuritymag

application

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cioviewpoint

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cioviewpoint

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cioviewpoint

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cioviewpoint

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cioviewpoint

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cioviewpoint

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Inaccurate Data Creating a False Sense of Security
Enterprisesecuritymag >> cxoinsights

Larry Hurtado, President &CEO, Digital Defense, Inc.

The efficacy of any information security infrastructure is wholly dependent on the accuracy of the underlying security intelligence. Faulty data can lead those responsible for security toward action–or inaction–that ultimately creates...

Enterprise Security And The Elusive
Enterprisesecuritymag >> csoinsight

Andre' Allen, CISO, City of Houston

Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer...

Myths and Truths: How CDNs can protect an Enterprise against DDoS Attacks
Enterprisesecuritymag >> cxoinsights

Leon Kuperman, CTO, Zenedge

A common CDN technique to thwart Layer 7 DDoS is page-caching. Since the CDN is caching content and/or pages for minutes or hours, any type of flood traffic to those pages will be absorbed by the CDN. This blocks the attack from ever making it to...

Denial of Service Attacks: From Bandwidth to APIs
Enterprisesecuritymag >> csoinsight

Edward G. Amoroso, SVP & CSO, AT&T

In the months leading up to the Millennium change, the Clinton White House was developing a comprehensive fusion center in Washington, DC to monitor the Y2K transition status of IT systems around the world. The idea was that domestic and...

Deploying Apps in AWS? Keeps These Security Risks in Mind
Enterprisesecuritymag >> cxoinsights

Haseeb Budhani, CEO, Soha Systems, Inc

Deploying applications in a public cloud environment can be an extremely liberating experience for applications teams. Amazon Web Services (AWS) and other public cloud providers are a panacea to the mind-numbing procedures and policies that...

Deploying Apps in AWS? Keeps These Security Risks in Mind
Enterprisesecuritymag >> cxoinsights

Haseeb Budhani, CEO, Soha Systems, Inc

Deploying applications in a public cloud environment can be an extremely liberating experience for applications teams. Amazon Web Services (AWS) and other public cloud providers are a panacea to the mind-numbing procedures and policies that...

Overcoming Enterprise Security Challenges with Continuous Monitoring in the Cloud
Enterprisesecuritymag >> cxoinsights

Sumedh Thakar, Chief Product Officer, Qualys

Across industries, organizations are realizing that traditional methods of security no longer stack up against today’s constantly evolving cyber threats. In addition, these tools often limit organizations’ ability to scale. With the...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...

Scaling Your Application Security Program
Enterprisesecuritymag >> csoinsight

Chris Wysopal, Co-Founder, CTO & CISO, Veracode

We now live in a world where software applications are omnipresent. The world’s largest enterprises are increasingly finding themselves in the software business. It doesn’t matter what their end products are, they are building Web...

Scaling Your Application Security Program
Enterprisesecuritymag >> csoinsight

Chris Wysopal, Co-Founder, CTO & CISO, Veracode

We now live in a world where software applications are omnipresent. The world’s largest enterprises are increasingly finding themselves in the software business. It doesn’t matter what their end products are, they are building Web...

Enterprise Security And The Elusive
Enterprisesecuritymag >> csoinsight

Andre' Allen, CISO, City of Houston

Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer...

Scaling Your Application Security Program
Enterprisesecuritymag >> csoinsight

Chris Wysopal, Co-Founder, CTO & CISO, Veracode

We now live in a world where software applications are omnipresent. The world’s largest enterprises are increasingly finding themselves in the software business. It doesn’t matter what their end products are, they are building Web...

Scaling Your Application Security Program
Enterprisesecuritymag >> csoinsight

Chris Wysopal, Co-Founder, CTO & CISO, Veracode

We now live in a world where software applications are omnipresent. The world’s largest enterprises are increasingly finding themselves in the software business. It doesn’t matter what their end products are, they are building Web...

Deploying Apps in AWS? Keeps These Security Risks in Mind
Enterprisesecuritymag >> cxoinsights

Haseeb Budhani, CEO, Soha Systems, Inc

Deploying applications in a public cloud environment can be an extremely liberating experience for applications teams. Amazon Web Services (AWS) and other public cloud providers are a panacea to the mind-numbing procedures and policies that...