enterprisesecuritymag

enterprise

Cybersecurity - Its Significance in the Business
Enterprisesecuritymag >> cioviewpoint

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack–struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity solutions....

Cybersecurity - Its Significance in the Business
Enterprisesecuritymag >> cioviewpoint

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack–struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity solutions....

Android in Enterprise BYOD
Enterprisesecuritymag >> cioviewpoint

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

Android in Enterprise BYOD
Enterprisesecuritymag >> cioviewpoint

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

Active Countermeasures Unveils New Versions of Rita and AI-Hunter
Enterprisesecuritymag >> cxoinsights

Chris Brenton, COO

One of the significant limitations of many security attestations is that they do not verify if a network being evaluated contains compromised systems. Today's security tools are incapable of distinguishing between normal network traffic and...

Active Countermeasures Unveils New Versions of Rita and AI-Hunter
Enterprisesecuritymag >> cxoinsights

Chris Brenton, COO

One of the significant limitations of many security attestations is that they do not verify if a network being evaluated contains compromised systems. Today's security tools are incapable of distinguishing between normal network traffic and...

Cybersecurity-Its Significance in the Business
Enterprisesecuritymag >> cxoinsights

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack– struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity...

Cybersecurity-Its Significance in the Business
Enterprisesecuritymag >> cxoinsights

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack– struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity...

Innovate business models with SophiaTX: a revolutionary enterprise blockchain platform pushing adoption in the ASEAN
Enterprisesecuritymag >> cxoinsights

KUALA LUMPUR – A successful enterprise blockchain event dubbed BUSINESS REDEFINED 2018 was held on September 25 at Suntec City, Singapore and September 27 at Connexion, Malaysia, representing the first step in building an ecosystem...

Understanding The New Endpoint Security Features For Your Enterprise
Enterprisesecuritymag >> cxoinsights

Enterprise IT security teams subjects to approximately  5,000 to 7,000 software vulnerabilities per year. Security personnel has to assess their organization's digital assets, evaluate their competitors' motives and strategies and be...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >>

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Enterprise Architecture success in the Digital Era
Enterprisesecuritymag >>

Anthony Hill, Executive Director Business & Enterprise Architecture, Kaiser Permanente

Digital Drivers for EA The onset of the digital era in business is driving sweeping change and adaptation in organizations in all sectors. The next 10 years could be the most compressed and change-inducing in the history of business. The...

Spring into Action! Growing Enterprise Architecture for Business Seasons
Enterprisesecuritymag >>

Martha Tartal, EA, United States Patent and Trademark Office

“Spring is the time of plans and projects.” Leo Tolstoy The sight of cherry blossoms may signify more than an end to cold weather. Depending on your organization’s budget cycle, the season of IT planning may also be in bloom....

Spring into Action! Growing Enterprise Architecture for Business Seasons
Enterprisesecuritymag >>

Martha Tartal, EA, United States Patent and Trademark Office

“Spring is the time of plans and projects.” Leo Tolstoy The sight of cherry blossoms may signify more than an end to cold weather. Depending on your organization’s budget cycle, the season of IT planning may also be in bloom....

SophiaTX Launches Enterprise-Ready Public Blockchain
Enterprisesecuritymag >>

Switzerland – SophiaTX successfully launched its mainnet with the primary purpose of creating a public blockchain with features and capabilities suitable for enterprise use.  With its fast and secure...

SophiaTX Launches Enterprise-Ready Public Blockchain
Enterprisesecuritymag >>

Switzerland – SophiaTX successfully launched its mainnet with the primary purpose of creating a public blockchain with features and capabilities suitable for enterprise use.  With its fast and secure...

The MDM Ecosystem
Enterprisesecuritymag >>

Sherri Adame, Enterprise Metadata and Master Data Leader | Chief Customer and Reference Data Governance Officer, Cigna

For the last two years I have been working on sound practical processes to govern data. That means creating an inventory of data by harvesting available metadata, creating metadata, and running unattended rules to ensure the metadata and data are...

Battlefield Principles for Cybersecurity Leaders
Enterprisesecuritymag >>

Jake Margolis, CISO, Metropolitan Water District of Southern California

Prior to becoming a CISO, I served in the California National Guard and U.S. Army as an Information Assurance professional and Brigade Signal Officer. The lessons and experiences that shaped my career were not learned through technical training or...

Improving Enterprise Security: Tackle Threats Caused by New Technologies
Enterprisesecuritymag >>

The digital revolution has changed the world in several ways. New technological solutions like cloud computing, analytics, and the very recent artificial intelligence, have streamlined processes but its potential aftermath cannot be ignored. There...

Improving Enterprise Security: Tackle Threats Caused by New Technologies
Enterprisesecuritymag >>

The digital revolution has changed the world in several ways. New technological solutions like cloud computing, analytics, and the very recent artificial intelligence, have streamlined processes but its potential aftermath cannot be ignored. There...