enterprisesecuritymag

automation

Five Best Practices for DevOps Automation
Enterprisesecuritymag >> cxoinsights

Open source libraries and frameworks play a crucial role in the DevOps environment that emphasizes the shorter development lifecycles, collaboration, and innovation. It’s important not to neglect the security of these open source...

Strategies for an Effective Blockchain Implementation
Enterprisesecuritymag >> cxoinsights

The security feature of blockchain is making it a lucrative technology for many industries and government organizations. The defense sectors in many countries are looking into the security challenges that come with adopting the...

DevOps Automation: the key to Managing Machine Identities
Enterprisesecuritymag >> cxoinsights

Manual managing machine identities can lead to some specific cybersecurity problems. DevOps is perceived to be agile, and it defeats the purpose of agility when the work is manual. The time spent on manual management of machine identities can...

Artificial Intelligence Driven RPA is Taking Businesses to New Heights
Enterprisesecuritymag >> cxoinsights

Companies across all industries have started to transfer their repetitive job to an automated environment. Industries like banking, healthcare, supply-chains, retail, and many others have already begun to comprehensively use robotic process...

The New Rise of Time Series Databases
Enterprisesecuritymag >> csoinsight

Michael Risse, VP, Seeq Corporation

Time series data storage and management has long been an interesting but quiet market category. It’s been a multibillion-dollar business for years and a main stay in process manufacturing plants since the 1980s. But recently, the category...

How Technology is Transforming Accounting and Auditing
Enterprisesecuritymag >> cxoinsights

Erik Asgeirsson, President and CEO of CPA.com, the technology subsidiary of the American Institute of CPAs

If you believe some pundits, technology represents a threat to accountants and auditors. Machines, the thinking goes, will be able to do sophisticated compliance work and the kind of in-depth analysis that only humans can offer now. We see it...

A Programmer, A Controls Engineer and A Mathematician Walk into an X-Bar..."
Enterprisesecuritymag >> cxoinsights

Dennis Rausch, VP of IT, Rea Magnet Wire Company, Inc.

In process manufacturing environments, the production operator relies heavily on process signals, closed-loop process controls, along with continuous and intermittent product testing results. The systems that would give the operator the very best...

AI is the New UI-AI + UX + DesignOps
Enterprisesecuritymag >> cioviewpoint

Amit Bahree, Executive, Global Technology and Innovation, Avanade

Today you cannot read any technology or business article without some discussion around Artificial Intelligence (AI), whether explicit or implicit. We see AI integrating deeper in all elements of our life–be it at home with our families, or...

Moving toward Successful SSH Key Management for Greater Network Security
Enterprisesecuritymag >> cxoinsights

Matthew McKenna, CSO, SSH Communications Security

When organizations realize that their poor to non-existent SSH user key management has created a significant hole in their network security, denial is often their first response. But when it comes to security, denial is dangerous. SSH user keys...

AI: What it Can Bring and How to Prepare for the Future
Enterprisesecuritymag >> cxoinsights

Chris Miller, Chief Technology & Innovation Officer, Avanade

Every decade a major disruption has occurred that altered the digital landscape: from the PC revolution, to the internet boom, to the mobile-first rise. Each development brought powerful opportunities for businesses that were smart enough to...

Importance of Enterprise Group Chat Authentication
Enterprisesecuritymag >> csoinsight

Omri Sigelman, Co-founder & Chief Strategy and Product Officer, NURO Secure Messaging

Instant messaging (IM) apps are taking over our business lives. Group chat capability provided by consumer IM services like Facebook Messenger, Snapchat and WhatsApp has found widespread appeal. Such is their convenience that employees are only...

The Great CIO Myth
Enterprisesecuritymag >> csoinsight

David Tamayo, CIO, DCS Corporation

Recently, after participating in a panel of so-called “experts” at the local chapter of the Society for Information Management, a young IT manager came afterwards to ask me, “How can I become a great defense industry CIO?”...

Improve Inventory and Product Availability with Digitization
Enterprisesecuritymag >> cxoinsights

Jett McCandless, CEO and Founder, Project44

Monitoring inventory can be a challenge. Maintaining the right stock levels—keeping enough inventory to avoid stock outs without bloating—has a lasting impact on both your bottom line and consumer happiness. Some experts estimate...

Marrying Technology and Education Science to Evolve Security Awareness and Training
Enterprisesecuritymag >> vendor

Joe Ferrara, President and CEO, Wombat Security

At Wombat Security, cyber awareness and training initiatives are central to our mission of changing employee behaviors and reducing risk to organizations. Education is one of the foundational elements of our unique methodology, and our approach is...

Achieving 'Safe and Secure'
Enterprisesecuritymag >> vendor

Clint Hilbert, CSO, Betafence

Regularly, my wife and I go out for a couples’ night with some of our friends. We tend to frequent this quaint pub in a nearby town; the pub offers a separate sitting area for the kids next to the fireplace, and the food’s great. Last...

Cloud Adoption A Road for Digital Business Growth
Enterprisesecuritymag >>

Joan Pepin, VP of Security, CISO, Sumo Logic

Dangers of Security Intrusions  I believe the most important foundational thing CISOs and security professionals can do is to understand the expectations of the CEO, board, executive   staff and peers or employees. These expectations...

Marrying Technology and Education Science to Evolve Security Awareness and Training
Enterprisesecuritymag >>

Joe Ferrara, President and CEO, Wombat Security

At Wombat Security, cyber awareness and training initiatives are central to our mission of changing employee behaviors and reducing risk to organizations. Education is one of the foundational elements of our unique methodology, and our approach is...

Deloitte: Multi-pronged Approach for Information Security Assurance
Enterprisesecuritymag >>

Chris Ruggeri, Principal with Deloitte Risk and Financial Advisory

Deloitte, a pioneer among the information security solution providers, is a professional network of multinationals; it is also the world's largest professional services network with revenue and a number of professionals. It is one of the "Big...

CyberArk: Laser-Focused on Privileged Accounts Security
Enterprisesecuritymag >>

Udi Mokady, Founder, Chairman and CEO

CyberArk is a company that focuses on striking down cyber threats which find their way inside to attack the core of an enterprise and provide the necessary threat management solutions. They are dedicated to preventing and stopping an attack before...