enterprisesecuritymag

cyber attack

The value of breach response services in cyber covers
Enterprisesecuritymag >> cxoinsights

Joel Pridmore, Head of Financial Lines and Business Development, Asia Pacific at Munich Re Syndicate

Would you know what to do in the event your organization suffered a data breach? While many CIO’s, CISO’s and even CRO’s may think they have the tools and expertise to handle what is today’s most serious threat to any...

Enterprises Beef Up Cybersecurity to Quash Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

Technology has reached the remotest locations in recent years. The Internet has opened new horizons and a sea of opportunities for businesses all over the world. Enterprises can now connect with their customers more effectively. A huge pipeline of...

Cyber Attacks to Watch out for in 2019
Enterprisesecuritymag >> cxoinsights

Cybersecurity witnessed a rapid multiplication of high-profile breaches and phishing attacks and in 2019 there may be the more of same.  The companies must secure their privileged accounts, eliminate excessive user privileges, prioritize...

Securing Media Content for a Multi Platform
Enterprisesecuritymag >> cxoinsights

The quality, reliability, and the uniqueness of the broadcaster’s or the programmer’s content are of the utmost importance in the media domain. However, recent cyber attacks across industries have caused the leakage of confidential...

Cybersecurity Market - A Second Coming for AI?
Enterprisesecuritymag >> cioviewpoint

In today’s advancing digital world, organizations, irrespective of the vertical, are faced with constantly evolving zero-day threats and are in dire need to address them rapidly. As the complexity of a cyber attack increases, so does the...

Redefining Cybersecurity with SIEM Practices
Enterprisesecuritymag >> cxoinsights

A famous adage says, “the best defense is the good offense”. With the increasing number of attacks in the cyber landscape, organizations should not only focus on their outside barrier but also form an effective inside barrier. This can...

Need for Digital Forensics and Incident Response Teams
Enterprisesecuritymag >> cxoinsights

Digital forensics is the branch of forensic science that deals with the collection and examination of digital evidence to identify why, when and how a criminal or hacking activity has occurred. Though the use of digital forensics in the corporate...

Information Security against Cyber attacks
Enterprisesecuritymag >> cxoinsights

Brad Peterson, EVP & CIO/CTO, Nasdaq

What are you spending on information security? What percentage of your spending on cybersecurity tools is on legacy vendors, and what percentage is on newer technology? For us, our spending has continued to increase for information security...

Identity and Access Management: Leave it to the Experts
Enterprisesecuritymag >> cxoinsights

Dr. Manu Kumar, Founder and Chief Firestarter, K9 Ventures

The start of every application ever built usually involves the developer figuring out how to allow users to create accounts and set up passwords. The number of times this wheel has been re-invented is almost mind boggling. Creating usernames,...

Cybersecurity Strategy - Do You Have One Yet?
Enterprisesecuritymag >> cxoinsights

Dina Moskowitz, CEO and Founder, SaaSMAX Corp

Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats,...

Security in a Digital Age
Enterprisesecuritymag >> cioviewpoint

David Behen, DTMB Director & CIO, State of Michigan

One of the many things that I love about my job as director of the Michigan Department of Technology, Management and Budget (DTMB) and state Chief Information Officer (CIO) is having the opportunity to speak to a wide variety of groups about how...

So What Does General Counsel Have to Do with Cyber-Security, Anyway?
Enterprisesecuritymag >> cxoinsights

Ronald Sarian, VP and General Counsel, eHarmony

eHarmony is big data.  We currently have approximately 60 million registrants, each of whom has completed our Relationship Questionnaire (RQ) that contains upwards of 150 questions specifically tailored by psychologists to elicit our...

Businesses Lose Up To Half a Million Due to a Security Breach
Enterprisesecuritymag >> cxoinsights

Michael Canavan, Vice President of Enterprise Engineering at Kaspersky Lab North America

The recent Verizon Data Breach Investigations Report indicates that in 60 percent of data breach cases, attackers were able to compromise an organization within minutes. Combine that with the fact that 90 percent of organizations have experienced...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >> cxoinsights

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...

Why Offensive Countermeasures Weaken Our Cybersecurity
Enterprisesecuritymag >>

Nuala O’Connor, President & CEO, Center for Democracy & Technology

For many fortunate Americans, cyber attacks and malicious hacking lives only in the headlines. When salacious details from private email conversations at a movie studio are posted online, we might snicker and wonder how someone could be so...

Leaders have a Duty-of-Care for Preventing, Mitigating and Transferring the Risks of a Cyber Attack
Enterprisesecuritymag >>

Arturo Perez-Reyes, SVP Cyber and Technology, HUB International

Large enterprises like Target, Sony and Home Depot may have grabbed headlines for recent cyber attacks, but small to mid-size businesses are the most exposed and the easiest prey. That’s because small businesses have fewer resources and may...

Security in a Digital Age
Enterprisesecuritymag >>

David Behen, DTMB Director & CIO, State of Michigan

One of the many things that I love about my job as director of the Michigan Department of Technology, Management and Budget (DTMB) and state Chief Information Officer (CIO) is having the opportunity to speak to a wide variety of groups about how...

So What Does General Counsel Have to Do with Cyber-Security, Anyway?
Enterprisesecuritymag >>

Ronald Sarian, VP and General Counsel, eHarmony

eHarmony is big data.  We currently have approximately 60 million registrants, each of whom has completed our Relationship Questionnaire (RQ) that contains upwards of 150 questions specifically tailored by psychologists to elicit our...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >>

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...

Why Offensive Countermeasures Weaken Our Cybersecurity
Enterprisesecuritymag >>

Nuala O’Connor, President & CEO, Center for Democracy & Technology

For many fortunate Americans, cyber attacks and malicious hacking lives only in the headlines. When salacious details from private email conversations at a movie studio are posted online, we might snicker and wonder how someone could be so...