enterprisesecuritymag

cloud computing

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >> cxoinsights

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

Importance of Embracing Cloud Computing To Enhance Security
Enterprisesecuritymag >> cxoinsights

Cloud computing has undoubtedly taken over the market when it comes down to data integration, processing, and management of late. Although cloud computing is gaining momentum, in the present scenario it is not free from the clutches of jeopardy...

No More Snake Oil: Shifting the Information Security Mentality
Enterprisesecuritymag >> cioviewpoint

Jeremiah Grossman, Interim CEO, WhiteHat Security

When was the last time you made a major purchase without some type of guarantee? Whether that guarantee was for the quality of the product or the comfort of a return policy, chances are good you were probably more inclined to trust the vendor who...

Delivery and Adoption of Cloud Computing
Enterprisesecuritymag >> cxoinsights

Michael Stoeckert, CTO, ProAssurance

What is “Cloud” ? Cloud computing delivery models provide users with on-demand access to a flexible, wide-ranging pool of technology assets composed of services, applications, servers, networks, and storage facilities. Due to the...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >> csoinsight

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

No More Snake Oil: Shifting the Information Security Mentality
Enterprisesecuritymag >> cioviewpoint

Jeremiah Grossman, Interim CEO, WhiteHat Security

When was the last time you made a major purchase without some type of guarantee? Whether that guarantee was for the quality of the product or the comfort of a return policy, chances are good you were probably more inclined to trust the vendor who...

Cloud Adoption A Road for Digital Business Growth
Enterprisesecuritymag >> cioviewpoint

Joan Pepin, VP of Security, CISO, Sumo Logic

Dangers of Security Intrusions  I believe the most important foundational thing CISOs and security professionals can do is to understand the expectations of the CEO, board, executive   staff and peers or employees. These expectations...

Company's Security: The Highest Priority
Enterprisesecuritymag >> cioviewpoint

Elizabeth Hackenson, SVP & CIO, AES Corporation

Accessing data for better decision making One challenge currently is the inability to easily access enterprise data in a very simple way that provides information to make better decisions. While there  are solutions currently in the market...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >> cxoinsights

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

Is There Auditible Security in the Cloud?
Enterprisesecuritymag >> cxoinsights

Preston Williams III, Senior Partner and CIO, GBC Global Services

I recently watched the CSPAN coverage of cloud computing in political campaigns held at the Graduate School of Political Management at George Washington University. Participants shared their views about cloud computing in campaigns, but the issue...

No More Snake Oil: Shifting the Information Security Mentality
Enterprisesecuritymag >> vendor

Jeremiah Grossman, Interim CEO, WhiteHat Security.

When was the last time you made a major purchase without some type of guarantee? Whether that guarantee was for the quality of the product or the comfort of a return policy, chances are good you were probably more inclined to trust the vendor who...

Cloud Adoption Rate Hike Spurs Demand for Security Professionals
Enterprisesecuritymag >> vendor

Julie Peeler, Foundation Director, (ISC)²

For many organizations, cloud adoption is no longer a question of if, but how much. Several factors are contributing to rapid growth and change in the cloud computing market. The cloud provides multiple business and consumer benefits, many of...

LSA Consultants: Making Enterprises Resilient
Enterprisesecuritymag >> vendor

Max Goh, Co-founder and MD

LSA Consultants is an enterprise security consulting company that helps companies to develop, implement, analyze, and audit their management systems to a compliant standard ready for certification. The company offers its expertise to deploy...

LSA Consultants: Making Enterprises Resilient
Enterprisesecuritymag >>

Max Goh, Co-founder and MD

LSA Consultants is an enterprise security consulting company that helps companies to develop, implement, analyze, and audit their management systems to a compliant standard ready for certification. The company offers its expertise to deploy...

Evolve IP: One Cloud. One Identity. Unlimited Applications.
Enterprisesecuritymag >>

Neill Reidy, Director, Cloud Computing

Evolve IP delivers customized strategies and integrated services for both communications and cloud computing; the company offers solutions that are programmed to work together and with applications and tools which are already in use by a company,...