enterprisesecuritymag

data breach

Tactical Decisions in Fighting Cyberattacks must be based on a Security Framework
Enterprisesecuritymag >> cxoinsights

Mike Benjamin, Senior Director of Threat Intelligence, CenturyLink

Security 101: Know Thyself Anyone looking for a sign to show the cybersecurity tide is turning, that the industry is starting to gain back the upper hand from cybercriminals, is going to have to wait abit longer. In the first few months of...

Data Breach - Why is it Harmful and How Can it be Avoided
Enterprisesecuritymag >> cxoinsights

The cybersecurity breach survey has reported that in 2017, 46 percent of all UK businesses had at least reported one cybersecurity breach or attack. The figure has increased exponentially from 2016 when only 24 percent of the businesses reported...

The End of an Era: Passwords Byte the Dust
Enterprisesecuritymag >> cxoinsights

Paul Christman, VP-Public Sector, Dell Software

Nearly every major data breach can be traced back to a compromised user-name and password that is exploited to gain unauthorized access to sensitive data. The pattern of most cyber breaches is similar—bad guys hijack credentials, escalate...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Safer Deposits: Beating the Cyber-threats Targeting Banks
Enterprisesecuritymag >> cioviewpoint

Gadi Naveh, Threat Prevention Evangelist, Check Point Software Technologies, Ltd

When the prolific career criminal Willie Sutton was asked why he specifically targeted banks, he reportedly replied: “Because that’s where the money is.” So it’s no surprise that cyberattacks against banks have increased...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cioviewpoint

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >> cxoinsights

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

October is National Cyber Security Awareness Month
Enterprisesecuritymag >> cxoinsights

Michael Dent, CISO, Fairfax County Government

Cyber Security should no longer be the hindrance to business in IT. Along that line, decision and policy makers need to also be cognizant that if decisions are being made, Cyber Security can no longer be the excuse for not securing solutions and...

The Employee-An Organization's Security Downfall or a Hidden Security Gem
Enterprisesecuritymag >> cxoinsights

Gordon MacKay, EVP and CTO, Digital Defense

Several years ago, while on a walk, my lively Pomeranian took notice of a few birds. They also took notice of her and nearly immediately took flight, reacting to what they perceived as impending danger. This was nature’s warning system in...

Businesses Lose Up To Half a Million Due to a Security Breach
Enterprisesecuritymag >> cxoinsights

Michael Canavan, Vice President of Enterprise Engineering at Kaspersky Lab North America

The recent Verizon Data Breach Investigations Report indicates that in 60 percent of data breach cases, attackers were able to compromise an organization within minutes. Combine that with the fact that 90 percent of organizations have experienced...

The Major Security Threat CIOs Largely Ignore
Enterprisesecuritymag >> cxoinsights

Dennis Amorosano, VP, BISG Marketing & CIIS Professional Services, Canon

From embracing BYOD policies to conferencing technology that allows colleagues and clients to collaborate from anywhere in the world, the workplace as we know it today has undergone tremendous change over the past decade. CIOs and other IT...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

DMARC - What Are You Waiting For?
Enterprisesecuritymag >> cioviewpoint

Shaun D. Marion, CISO, Honeywell International Inc.

According to Verizon’s 2015 Data Breach Investigation Report , more than two - thirds of incidents tied to Cyber-Espionage were originally sourced from phishing campaigns. Additionally, Symantec’s 2015 Internet Security Threat Report...

The Changing Landscape of Cyber Security
Enterprisesecuritymag >> cxoinsights

Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

As threats to information resources evolve, so must the cyber security community’s defense tactics. Gone are the days of implementing technology solutions solely on the network perimeter to thwart attackers. Information security defenses...

The Major Security Threat CIOs Largely Ignore
Enterprisesecuritymag >> cxoinsights

Dennis Amorosano, VP, BISG Marketing & CIIS Professional Services, Canon

From embracing BYOD policies to conferencing technology that allows colleagues and clients to collaborate from anywhere in the world, the workplace as we know it today has undergone tremendous change over the past decade. CIOs and other IT...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

The Employee-An Organization's Security Downfall or a Hidden Security Gem
Enterprisesecuritymag >> vendor

Gordon MacKay, EVP and CTO, Digital Defense

Several years ago, while on a walk, my lively Pomeranian took notice of a few birds. They also took notice of her and nearly immediately took flight, reacting to what they perceived as impending danger. This was nature’s warning system in...

Evolve IP: One Cloud. One Identity. Unlimited Applications.
Enterprisesecuritymag >>

Neill Reidy, Director, Cloud Computing

Evolve IP delivers customized strategies and integrated services for both communications and cloud computing; the company offers solutions that are programmed to work together and with applications and tools which are already in use by a company,...