DevOps Automation: the key to Managing Machine Identities
Enterprisesecuritymag >> news

Manual managing machine identities can lead to some specific cybersecurity problems. DevOps is perceived to be agile, and it defeats the purpose of agility when the work is manual. The time spent on manual management of machine identities can...

The ever-changing cybersecurity strategy - how to get it right?
Enterprisesecuritymag >> cxoinsights

Nilesh Jain, Vice President of SEA and India, Trend Micro

The cybersecurity landscape is closely interwoven with the ever-changing tech landscape. Advancements in technology must be equally reflected in cybersecurity. With increased adoption of cloud technologies, IoT, and connected systems, just to name...

Cyber Attacks to Watch out for in 2019
Enterprisesecuritymag >> news

Cybersecurity witnessed a rapid multiplication of high-profile breaches and phishing attacks and in 2019 there may be the more of same.  The companies must secure their privileged accounts, eliminate excessive user privileges, prioritize...

AI and ML Influence on Cloud Security
Enterprisesecuritymag >> news

Big data management is one of the difficult tasks for any organization today. For this reason, organizations prefer to utilize cloud services to manage the massive amount of data. Cloud services enable organizations to store, share and manage...

Integrating Drones into the Most Complex Airspace in the World
Enterprisesecuritymag >> cxoinsights

Sean S Torpey, Director of Infrastructure and Operations, FAA

Every day, more than 2 million passengers and 50,000 tons of cargo fly on 27,000 commercial flights within 5 million square miles of U.S. airspace. At any given time, roughly 7,000 pilots are airborne in aircrafts of different shapes and...

The Arising Need for Shift Left Security
Enterprisesecuritymag >> news

The growing culture in organizations to take an agile and DevOps approach to software application development is due to the ever-increasing dependency on software. In order to meet demands for a faster time to market, developers now play an active...

Enterprise Architecture success in the Digital Era
Enterprisesecuritymag >> cxoinsights

Anthony Hill, Executive Director Business & Enterprise Architecture, Kaiser Permanente

Digital Drivers for EA The onset of the digital era in business is driving sweeping change and adaptation in organizations in all sectors. The next 10 years could be the most compressed and change-inducing in the history of business. The...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >> cioviewpoint

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

Spring into Action! Growing Enterprise Architecture for Business Seasons
Enterprisesecuritymag >> cxoinsights

Martha Tartal, EA, United States Patent and Trademark Office

“Spring is the time of plans and projects.” Leo Tolstoy The sight of cherry blossoms may signify more than an end to cold weather. Depending on your organization’s budget cycle, the season of IT planning may also be in bloom....

Digital Transformation and IT Leadership, Be the Change
Enterprisesecuritymag >> cioviewpoint

Mark Thiele, CIO and CSO, Apcera & Chairman, IDCA Technical Committee

If there was ever a time for strong leadership across all lines of business, especially the IT function, now is that time. Many futurists suggest that we’re likely to see more change in the next 10 years than we saw in the previous 300....

Cloud Costs Love-Hate Relationship Advice Using F1 Tech and Bulk Sugar
Enterprisesecuritymag >> cxoinsights

Brent E, VP Technology Optimization, Ticketmaster

Interesting Cloud Cost article by CIO I have some advice that has been socialized with hundreds of folks and 100+ enterprises over the years. 8+ years and millions of unique workloads measured and optimized later, I am finding some analogies...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >> cioviewpoint

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Innovation through New Technologies
Enterprisesecuritymag >> cioviewpoint

Daniel Friel, CIO, International Securities Exchange Holdings Inc.

At ISE, we use cloud computing as an innovation platform to support our research and development efforts and explore opportunities before bringing them to market. Given the latency requirements around operating a financial marketplace, the cloud...

AI is the New UI-AI + UX + DesignOps
Enterprisesecuritymag >> cxoinsights

Amit Bahree, Executive, Global Technology and Innovation, Avanade

Today you cannot read any technology or business article without some discussion around Artificial Intelligence (AI), whether explicit or implicit. We see AI integrating deeper in all elements of our life–be it at home with our families, or...

DevOps Is Helping Enterprises to Carry Out Business Processes in a Secure Environment
Enterprisesecuritymag >> news

Enterprises have started realizing that cloud, artificial intelligence and DevOps are not a threat to security but actually they are the best way to reduce risk. DevSecOps thus is all set to steal the markets. New-generation processes and...

Banking on Trust: The Role of Security
Enterprisesecuritymag >> cxoinsights

Tom Watson, VP IT/Digital, Global CISO, Sealed Air Corporation

Corporate security has often been an afterthought in many industries. Although companies are quick to introduce new software applications, improve network architecture, and adopt cloud for storing data, security aspects of these technologies is...

Impact of Software Defined Transformation in the Enterprise
Enterprisesecuritymag >> cxoinsights

Vesko Pehlivanov, VP, Cybersecurity, Group CTO, Credit Suisse

Software Defined Networking is dead, long live Software Defined Networking. Software Defined Networking (SDN) never had a clear role in the traditional enterprise. It came in the guise of Open Flow as a solution looking for a problem. And the...

The Changing Role of the CISO
Enterprisesecuritymag >> cioviewpoint

Tammy Moskites, CIO & CISO, Venafi

Between the rise of Internet of Things and the increase in sophistication and frequency of cyber threats, the IT landscape remains ever-changing. We now have massive amounts of data at our fingertips, and technology is evolving faster than ever....

Why the Cloud May be the Safest Place to Store Your Sensitive Data
Enterprisesecuritymag >> cxoinsights

David Burg, Principal and Global and US Advisory Cybersecurity leader, PwC

The use of cloud computing is officially mainstream across most industries, yet many executives still worry that provider security practices remain inadequate to protect sensitive data and mission-critical workloads. It’s a long-held...

Managing IT Environments with Agility and Speed in an Increasingly Digital World
Enterprisesecuritymag >> cxoinsights

Laura Sanders, General Manager, IBM Global Technology Services Systems Services

In today’s digital economy, we can compare prices in real time and access pay-as-you-go services. We can provide and receive immediate feedback throughout every transaction. We can identify difficult business challenges, such as a security...