cyber security

DDoS Attack... for Dummies!
Enterprisesecuritymag >> cxoinsights

Thierry Derungs, Chief Digital Officer, BNP Paribas Wealth

DDoS attack shuts down key FinTech Sites But be cautious with "big titles" like in this article it could make you thinking that these FinTechs are weak... Understanding exactly the kind of attack is important. In this case, it was not...

The Digital Vision
Enterprisesecuritymag >> cioviewpoint

Cynthia Johnson, CIO, California Resources Corporation

The digital oilfield vision includes many use cases of technology. Advancements for the oilfield are keeping up and maybe outpacing Moore’s Law which suggests technology capability doubles every two years. However, the application of...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >> cioviewpoint

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

Making the Right Investment
Enterprisesecuritymag >> cioviewpoint

Brad Peterson, EVP & CIO, Nasdaq

For us, our spending has continued to increase for information security over the past three years while our overall technology spending has remained flat. This area and the new data technologies have been the growth areas for us. In terms of...

Information Security against Cyber attacks
Enterprisesecuritymag >> cioviewpoint

Brad Peterson, EVP & CIO/CTO, Nasdaq

What are you spending on information security? What percentage of your spending on cybersecurity tools is on legacy vendors, and what percentage is on newer technology? For us, our spending has continued to increase for information security...

Faster Risk Mitigation? Accelerate your Sector
Enterprisesecuritymag >> cioviewpoint

Brad Wheeler, Vice President for IT & CIO, Indiana University Bloomington and Board Member of IU Health Bloomington Hospital

In 2016, my CIO colleagues and I in the Big Ten Academic Alliance realized the game was quickly changing in cybersecurity. Each of us is responsible for protecting the data and technology assets of large, multi-billion dollar universities, and we...

8 Cyber Security Improvements to Reach the Next Level of Maturity
Enterprisesecuritymag >> cxoinsights

Michael Benz, VP Information Technology, Kraus-Anderson Construction Co.

Cybersecurity is on everyone’s mind and in everyone’s Twitter feed. Every week, we see troublesome news stories about the latest vulnerability, malicious hack, or data breach. Companies are looking to their CIO, with the expectation...

ML and AI in Security Threat Reduction
Enterprisesecuritymag >> cioviewpoint

Cybercrime is not only jeopardizing the technology circle; it also is disturbs every individuals life. The WannaCry ransomware attack in May 2017 stands a proof for the above statement. With the increase in the volume of personal and business...

The Industrial IoT Attack Surface
Enterprisesecuritymag >> cxoinsights

Matt Griffiths, Vice President, Data-Driven Transformation, Stanley Black & Decker, Inc.

Across the Industrial Manufacturing sector, the average plant and equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...

ONE SIZE FITS Al Cyber Security Program
Enterprisesecuritymag >> cxoinsights

Richard Rushing, CISO, Motorola

Over the last few years, we have discovered how hard information security has become, as the attackers have so many attack vectors into an organization. Some even have more resources and capabilities than many organizations that are being...

Security Advantages of Software Defined Networking (SDN)
Enterprisesecuritymag >> cxoinsights

Dr. Edward Amoroso, Member of the Board of Directors, M&T Bank

Perhaps the defining aspect of wide-area routing over Internet infrastructure has been decentralized control. Routers are manufactured to support protocols as stand-alone entities that accept, process, and route packets independently based on...

Cybersecurity Strategy - Do You Have One Yet?
Enterprisesecuritymag >> cioviewpoint

Dina Moskowitz, CEO and Founder, SaaSMAX Corp

Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats,...

Managing Digital Transformation by IT and Security Teams
Enterprisesecuritymag >> cioviewpoint

Elena Kvochko, CIO, Group Security Function, Barclays [NYSE:BCS]

Over the last couple of decades, companies have expanded their digital presence by fostering technology innovation. As a result, they are able to deliver a variety of services, and reach more stakeholders with the same amount of effort and at a...

A Closer Look at Block Chain Technology
Enterprisesecuritymag >> cioviewpoint

John Shea, CIO, Eaton Vance

As the CIO of Eaton Vance, I’d be compelled to say that the role of a CIO has advanced over the years. Fortunately, I started off in financial services and got some first-hand experience on software development and was able to inculcate...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >> cxoinsights

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

The Goldilocks Theory for Risk Management
Enterprisesecuritymag >> cioviewpoint

Patricia Titus, Chief Privacy & Information Security Officer, Markel Corporation [NYSE:MKL]

Companies need the flexibility to transform the way they do business in order to meet the market demands and security needs to transform its thinking. We know that technology hasn’t stopped evolving therefore adoption continues to grow at a...

Augmenting Cybersecurity in Healthcare Industry
Enterprisesecuritymag >> cxoinsights

Robert Napoli, CIO, Planned Parenthood of the Great Northwest and the Hawaiian Islands

The levels of cybersecurity threats have significantly increased over the past decade posing significant challenges in the healthcare organizations. In order to tackle these security issues, most organizations invest a lot of time and money to...

Vulnerable times
Enterprisesecuritymag >>

Technology is continuously getting integrated into every aspect of our lives and the dependency is rising with every passing day. At the same time, the risk involved in case of technological failure is quite high. In the past quarter of the...

Five Predictions that can change the phase of cyber security in 2018
Enterprisesecuritymag >>

Cyber security is a topic that is increasingly receiving an awful lot of attention. Especially since the world we live in has companies storing their data in the cloud and depends on networking systems. Generally, when talking about the latest...

A Cyber Security Metrics Tool for Utilities
Enterprisesecuritymag >>

Mark McGranaghan, VP, Distribution & Utilization, EPRI

As cyberthreats grow and become more sophisticated, utilities must constantly evaluate and improve the effectiveness of security programs. Moreover, utilities must manage their security programs across both traditional information technology (IT)...