enterprisesecuritymag

compliance

All Identities Matter
Enterprisesecuritymag >> cxoinsights

Daniel Krantz, CEO, Real-Time Technology Group

Clear and Present Insider Threat Now more than ever before, risk managers are faced with increasing physical security threats. Irrespective of the political debates, facility owners and operators are forced to implement changes in their...

Enterprise Security And The Elusive
Enterprisesecuritymag >> csoinsight

Andre' Allen, CISO, City of Houston

Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >> cioviewpoint

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...

Preventing Cyber-Attacks in Universities with Operational Collaboration
Enterprisesecuritymag >> csoinsight

Michael Corn, Deputy CIO & CISO, Brandeis University

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging...

Enterprise Risk Management and Cyber Security
Enterprisesecuritymag >> cioviewpoint

Monica Khurana, CIO, RS Investments

Cyber security has today emerged as the largest threat confronted by every organization. Cyber-attacks continue to increase in number and the impact of these incidents is also increasing in severity with every new attack. Financial services...

Developing Technology to Address Big Data and Cyber-Security Challenges
Enterprisesecuritymag >> cxoinsights

Paul Liebman, CCO, The University of Texas at Austin

Process Related and Substantive Risk Challenges There are many emerging challenges in compliance. Some are process related and others relate to substantive risk areas. On the process front, the principle concerns facing most organizations are...

Enterprise Security And The Elusive
Enterprisesecuritymag >> csoinsight

Andre' Allen, CISO, City of Houston

Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer...

Cloud Security Grows Up
Enterprisesecuritymag >> cioviewpoint

Kevin Winter, VP & CIO and Brian Javonillo, Senior Associate, Booz Allen Hamilton

Many companies today have established minimum levels of security requirements for their IT environments. CIOs are realizing, though, that those security models don’t translate when IT capabilities move to the Cloud. "Compliance...

Creating a Culture of Security
Enterprisesecuritymag >> cioviewpoint

Lyle Hardy, Global CIO, Teleperformance

The ongoing security breaches that continue to plague retailers, government websites, and online enterprises convey the impression that stopping unauthorized access to sensitive electronic details is a near impossible task. "The reality is...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

Is There Auditible Security in the Cloud?
Enterprisesecuritymag >> cioviewpoint

Preston Williams III, Senior Partner and CIO, GBC Global Services

I recently watched the CSPAN coverage of cloud computing in political campaigns held at the Graduate School of Political Management at George Washington University. Participants shared their views about cloud computing in campaigns, but the issue...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...

GEOBRIDGE Corporation: Cryptographic Key Management Simplified
Enterprisesecuritymag >> vendor

Jason Way, CTO

GEOBRIDGE Corporation, one of the leading encryption solutions providers, offers cryptography and key management, payment security, compliance, and HSM Virtualizing solutions and services. GEOBRIDGE was established in 1997; the company’s...

BESECURE LLC: Offering Holistic Solutions for Security and Compliance Needs
Enterprisesecuritymag >> vendor

Andreas Lalos, CEO & Co-Founder

BESECURE is a cybersecurity services company that helps its consumers to address a critical component of their security program by adopting a slightly holistic approach to tackle security and compliance challenges. The company provides GRC...

comforte AG: Facilitating Payment Security through Tokenization
Enterprisesecuritymag >> vendor

Michael Deissner, CEO

Comforte AG is a leading provider of data-centric security technology that is delivering payment and data security solutions to financial organizations through tokenization and innovative business strategies. The payment service solution provider...

Virtis: Mitigating Data Breach with Cutting-Edge Solutions
Enterprisesecuritymag >> vendor

Michelle Wilner, CEO

Virtis is a leading player in delivering artificial intelligence solutions, superior technology, and technical support to safeguard business crucial and high-value assets of leading companies and government organizations across the globe. The...