enterprisesecuritymag

computer

The Race against Cybercrime: Five Fundamental Strategies to Get you to the Finish Line
Enterprisesecuritymag >> cxoinsights

Destiny Bertucci, Head Geek™, SolarWinds

Singapore has seen tremendous progress in transforming its landscape and integrating with modern technology. The understanding that digital transformation is vital to growth—not to mention convenience and added efficiencies—is deeply...

Decoding security captcha with AI tool
Enterprisesecuritymag >> cxoinsights

A new artificial intelligence tool has been created by researchers that can read text captcha schemes used to protect the website from cyber attacks. The algorithm based on deep learning methods is the effective solver captcha security and...

Cyber Incident and Breach Response Planning: Is It an Option Any Longer?
Enterprisesecuritymag >> cioviewpoint

Jim Holtzclaw, SVP, Marsh Risk Consulting’s Cybersecurity Consulting and Advisory Services Practice

Cyber threats and related breach events are a fact of life for today’s organizations. Almost every business relies on the internet or utilizes connected technologies in some way in their operations or to generate revenue. A well-developed...

Healthcare Cybersecurity: Start with a Plan
Enterprisesecuritymag >> cxoinsights

William Phillips, Sr. VP & CIO, University Health System, San Antonio, Texas

Today’s healthcare landscape continues to become more complex each day. The CIO’s role is ever-expanding with additional responsibilities. At the top of this list is the protection and security of the systems and data of the...

Is Your Corporation Suffering From 'Data Sprawl'?
Enterprisesecuritymag >> cxoinsights

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3 Information today moves at a breakneck speed and the amount of data produced worldwide every day is staggering. With each new device and system added to a network, a...

Essential Add-ons for Fast Paced Cyber Threatscape: Enterprise Vulnerability and Threat Management
Enterprisesecuritymag >> cioviewpoint

Girish Chiruvolu, Director Information Security and Risk management, Thomson Reuters

In the age of all-pervasive cyber threats, enterprises with limited resources are stuck with the challenge of taking huge risks and finding right resources/ strategies around a formal risk management program. Ashley-Madison's exit from the...

FDA Cybersecurity Defenses and Enhancements within the Threat Landscape
Enterprisesecuritymag >> cxoinsights

Todd Simpson, CIO, FDA

The U.S. Food and Drug Administration (FDA) reliesrely on a strong enterprise security system to help the agency fulfill its global public health mission. In September 2016, the Government Accountability Office (GAO) issued a report, “FDA...

The Employee-An Organization's Security Downfall or a Hidden Security Gem
Enterprisesecuritymag >> cxoinsights

Gordon MacKay, EVP and CTO, Digital Defense

Several years ago, while on a walk, my lively Pomeranian took notice of a few birds. They also took notice of her and nearly immediately took flight, reacting to what they perceived as impending danger. This was nature’s warning system in...

Why Offensive Countermeasures Weaken Our Cybersecurity
Enterprisesecuritymag >> cxoinsights

Nuala O’Connor, President & CEO, Center for Democracy & Technology

For many fortunate Americans, cyber attacks and malicious hacking lives only in the headlines. When salacious details from private email conversations at a movie studio are posted online, we might snicker and wonder how someone could be so...

The Employee-An Organization's Security Downfall or a Hidden Security Gem
Enterprisesecuritymag >> cxoinsights

Gordon MacKay, EVP and CTO, Digital Defense

Several years ago, while on a walk, my lively Pomeranian took notice of a few birds. They also took notice of her and nearly immediately took flight, reacting to what they perceived as impending danger. This was nature’s warning system in...

Why Offensive Countermeasures Weaken Our Cybersecurity
Enterprisesecuritymag >>

Nuala O’Connor, President & CEO, Center for Democracy & Technology

For many fortunate Americans, cyber attacks and malicious hacking lives only in the headlines. When salacious details from private email conversations at a movie studio are posted online, we might snicker and wonder how someone could be so...