Cybersecurity - Its Significance in the Business
Enterprisesecuritymag >> cioviewpoint

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack–struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity solutions....

CDNs for Satiating Online Video Demand
Enterprisesecuritymag >> cxoinsights

The increasing dominance of the Internet and the demand for mobility have raised the user expectations to an unprecedented level. Content users expect not only engaging and relevant content but also delivery at the lightening speed. As the video...

Attack Surface Analysis - Response to the Information Security Management
Enterprisesecuritymag >> cxoinsights

James Norberg, Security Director, Express Scripts

Please elaborate on the challenges that you have currently observed in the information security landscape. Back in the days when everything was on-premise, understanding the attack surface wasn’t as big of a deal. Now, as we are...

The Future of Encryption in the Media and Broadcasting Industry
Enterprisesecuritymag >> cioviewpoint

Stephen Fridakis, Vice President, Media & Tech Ops, HBO

Broadcasters are using encryption to transmit programming to subscribers in a way that only those authorized can decrypt and view it. There are several applications for this kind of technology including secure distribution of copyrighted media...

Securing IoT Devices to Avert DDoS Attacks
Enterprisesecuritymag >> cioviewpoint

Will Long Sr., VP & CISO, IS Operations, Children’s Health

Traditionally, distributed denial of service (DDoS) attack was limited to one particular device or desktop. With the enormous growth and implementation of IoT devices including home routers, camcorders and DVR, these attacks have become much more...

Cybersecurity-Its Significance in the Business
Enterprisesecuritymag >> cxoinsights

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack– struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity...

Importance of Embracing Cloud Computing To Enhance Security
Enterprisesecuritymag >> cxoinsights

Cloud computing has undoubtedly taken over the market when it comes down to data integration, processing, and management of late. Although cloud computing is gaining momentum, in the present scenario it is not free from the clutches of jeopardy...

Drones Drive Big Data
Enterprisesecuritymag >> cxoinsights

Jeff W. Parisse, Director of Robotics - Monarch Inc.

The Greek poets were the first to divide history into ages; spans of time marked by significant human achievement. Although the Gold, Bronze and Iron ages have long past, people still use the milestones of human achievement to mark time...

Five Phases of Cloud Security
Enterprisesecuritymag >> cxoinsights

Over the past few years, the adoption of cloud computing in organizations has seen a meteoric rise, going from simple emailing platforms to elaborate HR services and customer relationship management (CRM) systems. Furthermore, as IT provision is...

IT Security Enters the Boardroom
Enterprisesecuritymag >> cxoinsights

Bill Bradley, SVP, Cyber Engineering and Technology Services at CenturyLink[NYSE:CTL]

Not too long ago, IT issues such as cybersecurity and data protection were reserved for the back office – and rarely considered by organizations in driving revenue and aligning market strategy. These efforts even ran independent of...

The Evolution of SD-WAN Network Architecture
Enterprisesecuritymag >> cioviewpoint

The provisioning and functioning of VPN services have significantly evolved rapidly over the last few years. While the burden of enormous hardware requirement has troubled most organizations, Software Defined WAN (SD-WAN) is the go-to solutions,...

Future-Proofing Your Enterprise for the New ICT: Immersive, Cognitive, and Trusted
Enterprisesecuritymag >> cxoinsights

Scott Snyder, Chief Technology and Innovation Officer, Safeguard Scientifics and Senior Fellow, The Wharton School

Over a century ago, Sears grew from an upstart mail-order watch retailer to become one of the top retailers in the U.S., opening physical stores and expanding into other categories such as internet services, credit cards, and even insurance....

Empowering the Next Wave of Innovation
Enterprisesecuritymag >> cioviewpoint

Chris Patterson, VP-Product Management, NaviSite

Rendezvous of Big Data and CDN In the past, CDNs have proven to be somewhat of a challenge for data analysis as they often produce an immense amount of data. The latest developments in big data, however, have directly addressed the issue of...

Kill the LAN!
Enterprisesecuritymag >> cxoinsights

Nick Roethel, Director of Technology Services (CIO), Metropolitan Transportation Commission

The LAN in the traditional sense is dying. For years, network engineers, suppliers and manufacturers have focused on multilayered, complex networks capable of routing traffic through a tapestry of complex equipment. Now, users demand simple...

Integrating Cloud Capability To Provide Reliability, Authentication, And Messaging Infrastructure
Enterprisesecuritymag >> cioviewpoint

Kim Tracy, CIO, Northeastern Illinois University

Infrastructure To Tackle The Onslaught Of Digital Content And Mobile Devices In being a public university, we look for investments in IT infrastructure that we believe will definitely be of value. Of the key parameters I look at the future...

Trends Impacting IT Infrastructure
Enterprisesecuritymag >> cioviewpoint

John M. Daane, DoIT (Director of Information Technology) at Emerald Coast Utilities Authority

What do you see as a big challenge in technology to meet the challenges of your industry? There are things that make every industry provider slightly unique, even if they deliver the same service or product. It is the nature of doing business...

Conquering Endpoint Security Challenges
Enterprisesecuritymag >>

Brian Thomas, CIO, Swope Health Services

1) What do you see as a big challenge in technology to meet the challenges of your industry? If you were to write down a wish list, what solutions do you look forward to and your expectations from technology providers for the enterprise? The...

Delivery and Adoption of Cloud Computing
Enterprisesecuritymag >>

Michael Stoeckert, CTO, ProAssurance

What is “Cloud” ? Cloud computing delivery models provide users with on-demand access to a flexible, wide-ranging pool of technology assets composed of services, applications, servers, networks, and storage facilities. Due to the...

Examining Past and Future DDoS Attacks: What Enterprises Can Do to Prepare
Enterprisesecuritymag >>

Tammy Moskites, CIO/CISO, Venafi

The Internet has technically been around since the 60’s, however academia has been using it since the 80s and commercial use actually began to grow rapidly in the 90’s. In the last 20 years the internet has grown over 100-times to well...

"Corporate Considerations: Dispelling the Myths of Cyber Security"
Enterprisesecuritymag >>

Neil Jarvis, CIO, Fujitsu America, Inc.

In the blockbuster hit, “Skyfall,” James Bond’s mission is to find and stop Raoul Silva, a former British agent who felt betrayed by “M” and his government. As it goes, he decides to take revenge by stealing critical...