enterprisesecuritymag

database

Road to Transform Digital Media Through Blockchain
Enterprisesecuritymag >> cxoinsights

Blockchain technology has gained popularity in last one year but many industries and sectors find it useful and have put up their views on how blockchain can transform and enhance the workflow. Another such industry is digital media which...

Android in Enterprise BYOD
Enterprisesecuritymag >> cxoinsights

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

Enhancing Customer Experience through AI
Enterprisesecuritymag >> cioviewpoint

Jason Maynard, VP, and GM at Zendesk Guide and Data Products

AI and the Evolution of Customer Experience Management (CEM) About 10 years ago, all business communications were done through email. Then, with the emergence of social channels such as Facebook and Twitter, it became progressively essential...

Software-Defined Security: The Missing Piece in Your SDDC Strategy
Enterprisesecuritymag >> csoinsight

Shishir Singh, VP, Network Security, Intel Security

It seems the stars are finally aligning to bring the much-promised benefits of the software-defined datacenter within reach of enterprise users. You know the promises: When our data centers are software-defined, we'll deliver new services...

Healthcare Cybersecurity: Start with a Plan
Enterprisesecuritymag >> cxoinsights

William Phillips, Sr. VP & CIO, University Health System, San Antonio, Texas

Today’s healthcare landscape continues to become more complex each day. The CIO’s role is ever-expanding with additional responsibilities. At the top of this list is the protection and security of the systems and data of the...

Enterprise Security And The Elusive
Enterprisesecuritymag >> csoinsight

Andre' Allen, CISO, City of Houston

Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer...

Strategies of Supply Chain Management to Respond to Potential Issues
Enterprisesecuritymag >> vendor

Michael Angelo, Chief Security Architect, NetIQ

Tuesday morning, I walked in and my phone was already ringing, never a good sign. Someone had just shared that a new Zero Day would be announced in just three days, and of course everyone was panicking. This is the type of news I really hate, a...

Enterprise Security And The Elusive
Enterprisesecuritymag >>

Andre' Allen, CISO, City of Houston

Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer...

R&K Cyber Solutions LLC: Behavior Computation to Tackle Cyber Threats
Enterprisesecuritymag >>

Joseph Carter, Founder & CEO

R&K Cyber Solutions LLC provides critical results for federal agencies and businesses through the use of agile cybersecurity technology and world-class expertise. As an industry leader among the best vulnerability management solution providers,...