enterprisesecuritymag

data security

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, CIO, WSSC

As consumers and recipients of services from utilities, our least favorite thing about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, CIO, WSSC

As consumers and recipients of services from utilities, our least favorite thing about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Effective Ways to Fortify Payment Processing
Enterprisesecuritymag >> cioviewpoint

With changing trends in the retail landscape, the possibilities of security breaches and data theft are higher than ever before today. While customers are usually unaware of the process to secure their confidential data such as credit card...

Effective Ways to Fortify Payment Processing
Enterprisesecuritymag >> cxoinsights

With changing trends in the retail landscape, the possibilities of security breaches and data theft are higher than ever before today. While customers are usually unaware of the process to secure their confidential data such as credit card...

The Challenges of Online Payments
Enterprisesecuritymag >> cioviewpoint

As technology advances in smartphones and e-wallets; purchase patterns change, and demand for cross-border multi-currency electronic payments increase, providers are under pressure to provide peer-to-peer payments beyond traditional banking...

Identity and Access Management as Portrayed by Game of Thrones
Enterprisesecuritymag >> cioviewpoint

Recent private data breaches have revealed that protecting data isn't sufficient, privileged access management solutions and identity access management, as well as knowing where data resides have become essential. Data Security in...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >> cioviewpoint

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...

Recovering from a Data Compromise: What should My Business Do Next?
Enterprisesecuritymag >> cioviewpoint

Larry Brennan, SVP Merchant Data Security & Cybersecurity Director, Bank of America Merchant Services

From major fast food chains to branches of government— and everything in between— it’s clear cybercriminals don’t discriminate when it comes to breaching businesses’ data defenses. Research confirms there have been...

Cybersecurity In A Connected Government
Enterprisesecuritymag >> cxoinsights

Behzad Zamanian, CIO, City Of Huntington Beach

As we enter the Internet of things era and people and systems become ever more interconnected, the capacity, extent, and value of information held online has also increased. So have industries and work to exploit that information to harm...

Cybersecurity In A Connected Government
Enterprisesecuritymag >> cxoinsights

Behzad Zamanian, CIO, City Of Huntington Beach

As we enter the Internet of things era and people and systems become ever more interconnected, the capacity, extent, and value of information held online has also increased. So have industries and work to exploit that information to harm...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> csoinsight

Vennard Wright, CIO, WSSC (Washington Suburban Sanitary Commission)

As consumers and recipients of services from utilities, our least favorite things about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, CIO, WSSC (Washington Suburban Sanitary Commission)

As consumers and recipients of services from utilities, our least favorite things about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Why the Cloud May be the Safest Place to Store Your Sensitive Data
Enterprisesecuritymag >> cxoinsights

David Burg, Principal and Global and US Advisory Cybersecurity leader, PwC

The use of cloud computing is officially mainstream across most industries, yet many executives still worry that provider security practices remain inadequate to protect sensitive data and mission-critical workloads. It’s a long-held...

Why the Cloud May be the Safest Place to Store Your Sensitive Data
Enterprisesecuritymag >> vendor

David Burg, Principal and Global and US Advisory Cybersecurity leader, PwC

The use of cloud computing is officially mainstream across most industries, yet many executives still worry that provider security practices remain inadequate to protect sensitive data and mission-critical workloads. It’s a long-held...

What We Should Be Learning and Doing Based On Today's Data Breaches
Enterprisesecuritymag >> vendor

Deborah Blyth, CISO, Colorado Governor's Office of Information Technology

As I continue to reflect on all of the data breaches over the past several months, there are certain consistencies that emerge, and there are specific actions these breached enterprises are taking to strengthen their attack prevention and data...

Data Security across the Enterprise
Enterprisesecuritymag >> vendor

Kas Nader, CIO & SVP of Global Technology, Atlanticus Holding

Paradigm Shift in Data Security Over the past five years, great strides have been made toward managing cost and availability. Virtualization, On Demand Computing, and Software as a Service are great examples of the progress that has been...

Data Security Should Be a Top HR Priority
Enterprisesecuritymag >>

William J.T. Strahan, EVP-HR, Comcast Cable

It is almost clichéd for an HR manager to cite confidentiality to avoid talking about details regarding everything from health care benefits to employee relations to pending promotions and terminations. In a world where personal privacy...

PT Dymar Jaya Indonesia: Adding Protection Layer to Data
Enterprisesecuritymag >>

Yuliani Kusnadi, Managing Director

Dymar Jaya Indonesia is one of the leading specialists in providing enterprise security solutions, with its focus on data security and data communications. The company is an expert in encryption, key management, and digital signature. The company...

PT Dymar Jaya Indonesia: Adding Protection Layer to Data
Enterprisesecuritymag >>

Yuliani Kusnadi, Managing Director

Dymar Jaya Indonesia is one of the leading specialists in providing enterprise security solutions, with its focus on data security and data communications. The company is an expert in encryption, key management, and digital signature. The company...

comforte AG: Facilitating Payment Security through Tokenization
Enterprisesecuritymag >>

Michael Deissner, CEO

Comforte AG is a leading provider of data-centric security technology that is delivering payment and data security solutions to financial organizations through tokenization and innovative business strategies. The payment service solution provider...