enterprisesecuritymag

data privacy

Road to Transform Digital Media Through Blockchain
Enterprisesecuritymag >> cioviewpoint

Blockchain technology has gained popularity in last one year but many industries and sectors find it useful and have put up their views on how blockchain can transform and enhance the workflow. Another such industry is digital media which...

Security Challenges in the era of Digital Transformation
Enterprisesecuritymag >> cxoinsights

Carlos Sousa, CISO, Affidea

Digital transformation is having a significant impact on technology, from data-driven decision-making, risk management frameworks, cloud adoption, mobility, massive explosion of Internet of Things and the impact goes far beyond of just deploying...

U.S. Businesses and the General Data Protection Regulation
Enterprisesecuritymag >> cioviewpoint

Greg Sparrow, SVP/GM, CompliancePoint

The General Data Protection Regulation (GDPR) is a European Union based regulation that requires businesses to protect the personal data and the privacy of any European Union (EU) natural persons when transactions occur within EU states. Data...

Blockchain for the Enterprise
Enterprisesecuritymag >> cxoinsights

Aaron Gette, CIO, The Bay Club Company

Most organizations have not implemented blockchain, but few are venturing into the development stage of projects and decentralized applications. There’s immeasurable hype and promise, backed by an intense amount of research and investment...

Artificial Intelligence and its Customer Value
Enterprisesecuritymag >> cxoinsights

Chitralekha Das, AI Enthusiast, Senior Program/Project manager, Intralinks

Artificial Intelligence (AI) is a natural extension of human intelligence. While AI has been around for a while, it has become so ubiquitous that it touches every one of us in some shape or form. There are numerous resources that capture how AI...

Banking on Trust: The Role of Security
Enterprisesecuritymag >> cxoinsights

Tom Watson, VP IT/Digital, Global CISO, Sealed Air Corporation

Corporate security has often been an afterthought in many industries. Although companies are quick to introduce new software applications, improve network architecture, and adopt cloud for storing data, security aspects of these technologies is...

Putting Customers in Control of their data
Enterprisesecuritymag >> cioviewpoint

Marty Ellingsworth, President, Salt Creek Analytics

Marty Ellingsworth, President, Salt Creek Analytics Now that “everyone has a smartphone” and the sharing economy is in full swing, companies engage customers and do more via mobile, cloud, and analytic platforms. Variety of new...

How Automation Impacts the Future of Radiology?
Enterprisesecuritymag >> cxoinsights

Shannon Werb, CIO & COO, vRad (Virtual Radiologic)

Despite the fact technology has touched every enterprise we come across of our life and has tried to change the traditional ways of doing businesses. But still, there are issues unique to imaging that keep me up at night as the CIO of the...

Protecting Legacy and Next-Gen Networks
Enterprisesecuritymag >> cxoinsights

Brad Boston, President & CEO, NetNumber

As the former CIO at Cisco, security was one of those concerns that kept me awake at night— specifically, protecting our infrastructure and intellectual property, and ensuring we protected the information of our employees, customers, and...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >> csoinsight

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the Digital Age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Rethinking Security and Privacy in the Era of Empowered Digital Users
Enterprisesecuritymag >> cxoinsights

Scott A. Snyder, President & Chief Strategy Officer, Mobiquity, Robert McCarthy, Principal Technical

In 2007, Steve Jobs unveiled the iPhone, ushering in a new wave of high-end smartphones and native “apps”. Within a year, Google followed suit with the introduction of the Android operating system, an open OS powering a consortium of...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >> cioviewpoint

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the digital age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Employing Strategies For Cyber Security
Enterprisesecuritymag >> csoinsight

Sunil Garg, CIO, Exelon

Defining Problems to Determine Economic Technology While it seems cliché, a major challenge in 2014 (and going forward) is Big Data. To some degree, the term ‘Big Data’ has become so overused to have lost meaning; however,...

Rethinking Security and Privacy in the Era of Empowered Digital Users
Enterprisesecuritymag >> vendor

Scott A. Snyder, President & Chief Strategy Officer, Mobiquity, Robert McCarthy, Principal Technical

In 2007, Steve Jobs unveiled the iPhone, ushering in a new wave of high-end smartphones and native “apps”. Within a year, Google followed suit with the introduction of the Android operating system, an open OS powering a consortium of...

Boxcryptor: Seamless End-to End Encryption
Enterprisesecuritymag >> vendor

Andrea Pfundmeier, Co-Founder & CEO

Boxcryptor is a market leader in providing cybersecurity solutions with its end-to-end encryption software optimized for cloud storage. Supporting more than 30 providers, Boxcryptor is optimized for use with cloud storage providers such as...

SmartLockr, powered by AttachingIT: A New Frontier for Secure Business Communication
Enterprisesecuritymag >> vendor

Hans de Graaf, CEO

SmartLockr is a cybersecurity solutions company with security standards that eliminates gaps in email security. Implementing this platform makes receiving and sending emails much safer than the regular method. The company helps prevent the chances...

comforte AG: Facilitating Payment Security through Tokenization
Enterprisesecuritymag >> vendor

Michael Deissner, CEO

Comforte AG is a leading provider of data-centric security technology that is delivering payment and data security solutions to financial organizations through tokenization and innovative business strategies. The payment service solution provider...

Cyphre: Razor-Sharp End-to-End Encryption
Enterprisesecuritymag >> vendor

Larry Lozon, Co-founder & Global Product Manager

Companies endure malicious trespasses daily on the corporate network, employee computers, and cloud. Therefore, they spend millions on IT upgrades, insurance premiums, and compliance fines annually; these costs can be cut down by employing the...

ENC Security: Balancing Security and Usability
Enterprisesecuritymag >>

Jeroen Wortelboer, CTO

ENC Security provides a range of digital applications. From robust security to almost perfect file and data recovery to seamless, up-to-date syncing and teamwork, the company makes it easy to keep every file like financial records of businesses,...