enterprisesecuritymag

encryption

The Race against Cybercrime: Five Fundamental Strategies to Get you to the Finish Line
Enterprisesecuritymag >> cxoinsights

Destiny Bertucci, Head Geek™, SolarWinds

Singapore has seen tremendous progress in transforming its landscape and integrating with modern technology. The understanding that digital transformation is vital to growth—not to mention convenience and added efficiencies—is deeply...

The Importance of Conforming to HIPAA for Healthcare Entities
Enterprisesecuritymag >> cioviewpoint

Randall Frietzsche, CISO, Denver Health

If you are a US-based healthcare entity, and you electronically bill for your services, you probably fall under HIPAA regulations. HIPAA requires encryption to protect patient data. This article will discuss the key points of this requirement....

The Era of Mobile Computing
Enterprisesecuritymag >> cxoinsights

Cyberthreats continue to evolve at a fast pace as cell information turns into vulnerable entity. Hackers can uncover weak passwords. Misplaced cell units that are not password protected can turn into a goldmine of private information for the...

Insights on Enterprise IT Encryption
Enterprisesecuritymag >> cxoinsights

Dr. Jordon Shaw, Director of IT, City of Franklin, TN

Technological Trends and Challenges Today, signature-based antivirus as well as hardware and software are becoming more prominent. We really have to think about our portable devices and data at rest. The federal government many years ago...

Sensitive Data Protection Processes-A Key to IT Security
Enterprisesecuritymag >> cxoinsights

Randy Marchany, CISO, Virginia Tech IT Security Office

One of the common mistakes organizations make is to focus on the technologies rather than protecting the organization’s sensitive data. Certainly, protecting devices is a necessary task but it’s the data that counts. There are no...

The Major Security Threat CIOs Largely Ignore
Enterprisesecuritymag >> cioviewpoint

Dennis Amorosano, VP, BISG Marketing & CIIS Professional Services, Canon

From embracing BYOD policies to conferencing technology that allows colleagues and clients to collaborate from anywhere in the world, the workplace as we know it today has undergone tremendous change over the past decade. CIOs and other IT...

The Hidden Disadvantage Of Strong Encryption
Enterprisesecuritymag >> csoinsight

Andrea Di Fabio, Interim CIO, Norfolk State University

The widespread availability of strong encryption, together with the Snowden effect, has propelled an arms race to aggressively and pervasively adopt strong encryption. Software developers and information security companies are riding this new wave...

What We Should Be Learning and Doing Based On Today's Data Breaches
Enterprisesecuritymag >> cxoinsights

Deborah Blyth, CISO, Colorado Governor's Office of Information Technology

As I continue to reflect on all of the data breaches over the past several months, there are certain consistencies that emerge, and there are specific actions these breached enterprises are taking to strengthen their attack prevention and data...

The Major Security Threat CIOs Largely Ignore
Enterprisesecuritymag >> cioviewpoint

Dennis Amorosano, VP, BISG Marketing & CIIS Professional Services, Canon

From embracing BYOD policies to conferencing technology that allows colleagues and clients to collaborate from anywhere in the world, the workplace as we know it today has undergone tremendous change over the past decade. CIOs and other IT...

3 Steps to Elevating Corporate Security
Enterprisesecuritymag >> vendor

Mark Kelly, CIO | VP of IT and Services, Curvature

IT Leaders are consistently reminded about the need for improved security of their IT assets. However, in most organizations security concerns take a backseat to high-visibility efficiency gain projects. When security does gain an...

Kanguru Solutions: Unparalleled Data Security Solutions
Enterprisesecuritymag >> vendor

Don Brown, CEO

Kanguru is the leading manufacturer of secure USB encrypted hardware, portable data storage of high quality, fully integrated secure remote management, duplicating equipment, and encryption solutions for companies from around the world. Kanguru is...

Cyphre: Razor-Sharp End-to-End Encryption
Enterprisesecuritymag >> vendor

Larry Lozon, Co-founder & Global Product Manager

Companies endure malicious trespasses daily on the corporate network, employee computers, and cloud. Therefore, they spend millions on IT upgrades, insurance premiums, and compliance fines annually; these costs can be cut down by employing the...

DataMotion: Encryption for Digital Business Compliance
Enterprisesecuritymag >>

Bob Janacek, Co-founder and CEO

DataMotion is premiere encryption solution provider that offers secure data solutions such as email encryption. By using DataMotion, companies can exchange email, files and other information easily and securely with partners and their cloud...