enterprisesecuritymag

data privacy

Road to Transform Digital Media Through Blockchain
Enterprisesecuritymag >> cioviewpoint

Blockchain technology has gained popularity in last one year but many industries and sectors find it useful and have put up their views on how blockchain can transform and enhance the workflow. Another such industry is digital media which...

Security Challenges in the era of Digital Transformation
Enterprisesecuritymag >> cxoinsights

Carlos Sousa, CISO, Affidea

Digital transformation is having a significant impact on technology, from data-driven decision-making, risk management frameworks, cloud adoption, mobility, massive explosion of Internet of Things and the impact goes far beyond of just deploying...

U.S. Businesses and the General Data Protection Regulation
Enterprisesecuritymag >> cioviewpoint

Greg Sparrow, SVP/GM, CompliancePoint

The General Data Protection Regulation (GDPR) is a European Union based regulation that requires businesses to protect the personal data and the privacy of any European Union (EU) natural persons when transactions occur within EU states. Data...

Blockchain for the Enterprise
Enterprisesecuritymag >> cxoinsights

Aaron Gette, CIO, The Bay Club Company

Most organizations have not implemented blockchain, but few are venturing into the development stage of projects and decentralized applications. There’s immeasurable hype and promise, backed by an intense amount of research and investment...

Artificial Intelligence and its Customer Value
Enterprisesecuritymag >> cxoinsights

Chitralekha Das, AI Enthusiast, Senior Program/Project manager, Intralinks

Artificial Intelligence (AI) is a natural extension of human intelligence. While AI has been around for a while, it has become so ubiquitous that it touches every one of us in some shape or form. There are numerous resources that capture how AI...

Banking on Trust: The Role of Security
Enterprisesecuritymag >> cxoinsights

Tom Watson, VP IT/Digital, Global CISO, Sealed Air Corporation

Corporate security has often been an afterthought in many industries. Although companies are quick to introduce new software applications, improve network architecture, and adopt cloud for storing data, security aspects of these technologies is...

Putting Customers in Control of their data
Enterprisesecuritymag >> cioviewpoint

Marty Ellingsworth, President, Salt Creek Analytics

Marty Ellingsworth, President, Salt Creek Analytics Now that “everyone has a smartphone” and the sharing economy is in full swing, companies engage customers and do more via mobile, cloud, and analytic platforms. Variety of new...

How Automation Impacts the Future of Radiology?
Enterprisesecuritymag >> cxoinsights

Shannon Werb, CIO & COO, vRad (Virtual Radiologic)

Despite the fact technology has touched every enterprise we come across of our life and has tried to change the traditional ways of doing businesses. But still, there are issues unique to imaging that keep me up at night as the CIO of the...

Protecting Legacy and Next-Gen Networks
Enterprisesecuritymag >> cxoinsights

Brad Boston, President & CEO, NetNumber

As the former CIO at Cisco, security was one of those concerns that kept me awake at night— specifically, protecting our infrastructure and intellectual property, and ensuring we protected the information of our employees, customers, and...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >> csoinsight

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the Digital Age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Rethinking Security and Privacy in the Era of Empowered Digital Users
Enterprisesecuritymag >> cxoinsights

Scott A. Snyder, President & Chief Strategy Officer, Mobiquity, Robert McCarthy, Principal Technical

In 2007, Steve Jobs unveiled the iPhone, ushering in a new wave of high-end smartphones and native “apps”. Within a year, Google followed suit with the introduction of the Android operating system, an open OS powering a consortium of...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >> cioviewpoint

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the digital age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Employing Strategies For Cyber Security
Enterprisesecuritymag >> csoinsight

Sunil Garg, CIO, Exelon

Defining Problems to Determine Economic Technology While it seems cliché, a major challenge in 2014 (and going forward) is Big Data. To some degree, the term ‘Big Data’ has become so overused to have lost meaning; however,...

Rethinking Security and Privacy in the Era of Empowered Digital Users
Enterprisesecuritymag >> vendor

Scott A. Snyder, President & Chief Strategy Officer, Mobiquity, Robert McCarthy, Principal Technical

In 2007, Steve Jobs unveiled the iPhone, ushering in a new wave of high-end smartphones and native “apps”. Within a year, Google followed suit with the introduction of the Android operating system, an open OS powering a consortium of...

Boxcryptor: Seamless End-to End Encryption
Enterprisesecuritymag >> vendor

Andrea Pfundmeier, Co-Founder & CEO

The company provides end-to-endencryption software optimized for cloud storage

SmartLockr, powered by AttachingIT: A New Frontier for Secure Business Communication
Enterprisesecuritymag >> vendor

Hans de Graaf, CEO

Combines business class email with the security standards to eliminate email security gaps

comforte AG: Facilitating Payment Security through Tokenization
Enterprisesecuritymag >> vendor

Michael Deissner, CEO

Delivers payment and data security solutions to financial organizations through tokenization and innovative business strategies

Cyphre: Razor-Sharp End-to-End Encryption
Enterprisesecuritymag >> vendor

Larry Lozon, Co-founder & Global Product Manager

The company provides digital data protection and encryption solutions for energy, finance, and healthcare markets...

ENC Security: Balancing Security and Usability
Enterprisesecuritymag >>

Jeroen Wortelboer, CTO

ENC designs, develops, and consults on data privacy management software systems for business, consumer, government, and institutional application