enterprisesecuritymag

byod

What are the Significant Endpoint Strategies One Must Know?
Enterprisesecuritymag >> cxoinsights

It is vital to understand what the user wants to accomplish and then match it with a solution to meet the needs to protect the data. FREMONT, CA: Users or employees today look forward to creating, editing, and reviewing corporate information...

The Practical Principles of Physical Security - Applying Tried and True Principles to New Challenges
Enterprisesecuritymag >> cxoinsights

Harley Aw, CISO, Phoenix HSL

In an age of mobility, agility and cloud-centricity, our industry is currently grappling with a generational shift in attitudes towards the relevancy of physical security. Yet, failure to do enough in this area still poses disastrous...

8 Steps CIOs Should Know to Create Cloud Security Policy
Enterprisesecuritymag >> cxoinsights

As the latest series of malware and exfiltration techniques continue to harm the data and applications of the companies on-premises and in the cloud, it has become essential to devise cloud security policies to keep the companies' data safe...

Enterprise Security for IDIoTs
Enterprisesecuritymag >> cxoinsights

Lishoy Francis, Senior Consultant, Consult Hyperion

About 15 years ago, we built a robot to automate the some of the testing we do in-house. We called the robot “Roger” and thought nothing more of it. The idea of people and robots being somehow interchangeable in the workplace has since...

Cloud IAM Challenges that Demand Your Immediate Attention
Enterprisesecuritymag >> cioviewpoint

Brad Puckett, Global ProductDirector - Cybersecurity, Global Knowledge

Identity and access management (IAM) and credentialing are not onlyfundamentals of cybersecurity design, but also long-held necessitiesof networks and services. For decades,our digital lives have been inundatedby usernames, passwords, domain...

Securing Corporate Executives' Cherished Mobile Asset
Enterprisesecuritymag >> cioviewpoint

Umesh Yerram, Vice President of Information Security & Data Protection Officer at AmerisourceBergen

Mobile phones are powerful, ubiquitous and continuously connected to sensitive data. Personal and professional business activities increasingly coexist on the same device. Even when companies do not endorse “bring your own device”...

Mobility Landscape in Healthcare
Enterprisesecuritymag >> cxoinsights

Steve Crocker, Chief Information Security Officer at Methodist Le Bonheur Healthcare

Security leaders are constantly challenged by threats from the growing use of mobile devices in the workforce. Nowhere is this more evident than in the healthcare industry. Healthcare has recently seen an explosion of technology innovation aimed...

10 Tips For CIOs to Avoid BYOD Security Risks
Enterprisesecuritymag >> cxoinsights

BYOD has become a popular trend among enterprises. However, how can CIOs cope up with the security risks of BYOD? FREMONT, CA: BYOD (Bring your own device) is a business policy that gives its employees the authority to use their own devices...

BYOD, CYOD or COPE: Which Enterprise Mobility Strategy Suits Your Business Best?
Enterprisesecuritymag >> cxoinsights

There are a lot of arguments going on about BYOD, CYOD, and COPE. Which one to choose? Which mobility strategy will lead to more productivity and more employee satisfaction?  FREMONT, CA: As people are becoming more addicted to their...

Cloud Security Amplifying Business Growth
Enterprisesecuritymag >>

Chris White, Deputy CISO, Interpublic Group[NYSE:IPG]

The influx of humungous amounts of data pertaining to customers, employees, and external stakeholders has elevated the need for its protection. What better way than to migrate and maintain all this data in the cloud, thus creating the most...

Taking Healthcare Cybersecurity Beyond Basic Compliance
Enterprisesecuritymag >>

It is imperative for healthcare organizations to move forward from the basic security compliance toward securing crucial data and vulnerable systems. FREMONT, CA: Compliance is a leading concern in the healthcare landscape. The data...

Smart IT Inventory Ensures Cybersecurity, Learn How!
Enterprisesecuritymag >>

While enterprises look for advanced cybersecurity solutions, technologists have come up with smart inventory management system, which is all set to cater to these real-time security needs.    FREMONT, CA: Cybersecurity has become...

To Silicon Valley and Beyond: Leaving MPLS Behind
Enterprisesecuritymag >>

Zane Burnett, Former VP of Digital Innovation and Technology, Alain Pinel Realtors

I am fortunate enough to have the opportunity to work for a large and successful real estate firm in the country’s most active real estate market. The Bay Area of California is home to Silicon Valley: where technological innovation is...

One Step Closer to Becoming Cybersmart
Enterprisesecuritymag >>

Nancy Libersky, District Director, U.S. Small Business Administration

As enterprises move toward newer, better technologies, the rate at which security risks surface the organization is alarming. These risks pertain to a plethora of arenas, ranging from BYOD devices to backend servers, and more. It is therefore...

Cybersecurity solutions for BYOD trend in Healthcare Industry
Enterprisesecuritymag >>

The healthcare IT environment has evolved over the years with the introduction of various emerging technologies. Technologies like the Internet of Medical Things (IoMT) have grown significantly, which has made the healthcare IT environment more...

AI-based Cybersecurity Tools of the Next Generation
Enterprisesecuritymag >>

University networks have been seen as poor information safety models for a long time. However, many of these networks’ challenges (wide adoption of consumer-grade services, such as BYOD) are increasingly challenging in practice. Many of the...

Finding Ways to Successfully Implement Vulnerability Management
Enterprisesecuritymag >>

Jeff Stein, Staff Security Engineer, Financial Engines

The importance of and need for a well-defined and properly implemented vulnerability management program continues to increase as the technology we utilize and the industry driving it changes. New arenas such as cloud computing and distributed...

Leveraging MFA to Prevent the Wrath of Phishing Attacks
Enterprisesecuritymag >>

Recently, Intuit’s TurboTax application became another victim of a data breach. Victims of this particular attack had their information like social security numbers, address, date of birth, driver’s license number, previous tax...

Strategies to Implement Effective Security for Corporate Data
Enterprisesecuritymag >>

Data is the lifeline of businesses today as the success of business strategies depend majorly on the efficient use of data. Acknowledging the significance of data, many data privacy regulations have been enacted like the General Data Protection...

Want to Improve Enterprise's Endpoint Security, Here's How
Enterprisesecuritymag >>

As one can witness the proliferation of devices like laptops and smartphones, there has been a sharp rise in the number of devices being lost or stolen. These incidents indicate the massive loss of sensitive data for enterprises that encourage...