enterprisesecuritymag

facebook

Insecurity U
Enterprisesecuritymag >> cioviewpoint

David Crain, Assistant Provost & CIO, Southern Illinois University

Am I just paranoid or should we be concerned with the present state of security within higher education? I very much think the latter. In the last few weeks, we learned that a cybercrime group in Russia may have obtained 1.2 billion stolen...

How to get your information security to lift more weight
Enterprisesecuritymag >> cxoinsights

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security

Information security sometimes appears to be stuck, still suffering from the same basic problems: weak passwords, unpatched vulnerabilities, and too much (or too little) data to make sense of what is really happening. While it is fascinating to...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

A Deeper View into the Threat Landscape
Enterprisesecuritymag >> csoinsight

James Carder, CISO & VP of LogRhythm Labs

The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime groups, hacktivism (though that has been receiving less press lately), terrorist organizations...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> csoinsight

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> csoinsight

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Preventing Cyber-Attacks in Universities with Operational Collaboration
Enterprisesecuritymag >> csoinsight

Michael Corn, Deputy CIO & CISO, Brandeis University

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

A Deeper View into the Threat Landscape
Enterprisesecuritymag >> csoinsight

James Carder, CISO & VP of LogRhythm Labs

The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime groups, hacktivism (though that has been receiving less press lately), terrorist organizations...

Creating a Culture of Security
Enterprisesecuritymag >> cioviewpoint

Lyle Hardy, Global CIO, Teleperformance

The ongoing security breaches that continue to plague retailers, government websites, and online enterprises convey the impression that stopping unauthorized access to sensitive electronic details is a near impossible task. "The reality is...

Insecurity U
Enterprisesecuritymag >> cioviewpoint

David Crain, Assistant Provost & CIO, Southern Illinois University

Am I just paranoid or should we be concerned with the present state of security within higher education? I very much think the latter. In the last few weeks, we learned that a cybercrime group in Russia may have obtained 1.2 billion stolen...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> csoinsight

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Cloud-based Security: Future of the Industry?
Enterprisesecuritymag >> cxoinsights

Dmitri Alperovitch, Co-Founder & CTO, CrowdStrike

At AppSec California 2015, Alex Stamos, formerly with Yahoo and now CSO at Facebook, gave a really interesting talk titled “AppSec is Eating Security.” Among the many insightful comments he made during the talk, one was particularly...

Intensity Analytics: Establishing Trust in Digital Identity
Enterprisesecuritymag >> vendor

Tom Ketcham, CIO & EVP

Intensity Analytics is an AI-based software development company comprising of expert developer entrepreneurs, industry thought leaders and long-time inventors of critical technology who measures human effort when people interact with devices for...

Very: The Very Truth of Blockchain
Enterprisesecuritymag >> vendor

Ryan Prosser, President

Very is a blockchain solution provider focused on blockchain, machine learning, and IoT across a variety of industries. The company constructs scalable platforms that are ready for production. It finds creative approaches to challenging issues...

DataMotion: Encryption for Digital Business Compliance
Enterprisesecuritymag >> vendor

Bob Janacek, Co-founder and CEO

DataMotion is premiere encryption solution provider that offers secure data solutions such as email encryption. By using DataMotion, companies can exchange email, files and other information easily and securely with partners and their cloud...