Importance Of Adopting a Multi-Pronged Approach to Secure Networks
Enterprisesecuritymag >> cioviewpoint

Robbie Corley, CISO,Kentucky Community & Technical College System

Gaining visibility and insight into an enterprise network is imperative.Our threat economy from 10 - 15 years ago has evolved.While perimeter-based protection continues to provide a valuable protection model, the attacker philosophy has...

Waterfall Security Solutions Partnering with Indegy Securely Exchanges Data between OT and IT
Enterprisesecuritymag >> news

Lior Frenkel, Co-Founder and CEO

Waterfall Security Solutions Partners with Indegy to centralize OT and IT security monitoring. FREMONT, CA: Waterfall Security Solutions, an industrial cybersecurity technology provider, offers best security products based on its proprietary...

Cybersecurity Challenges to Enhance Web Security for Enterprises
Enterprisesecuritymag >> cioviewpoint

Billy Spears, SVP, Chief Information Security Officer, loanDepot

Wowza! Another massive data breach affecting more than 100 million people across the United States due to an improperly configured Web Application Firewall (WAF). The exposed data contained information submitted by the customers and small...

Security in the Cloud Requires a New Way of Thinking
Enterprisesecuritymag >> cxoinsights

Dan Constantino, Director, Security Operations, Cox Automotive

Remember when it was the Security team’s job to implement policies, procedures, and controls that an organization “must” follow to ensure they were “secure”? The typical Security team approved tickets for firewall...

Protect Your Applications with a Secure SDLC
Enterprisesecuritymag >> cxoinsights

Chad Bairnsfather, Director of Information Security, EnvisionRxOptions

Security of web applications is an essential part of any enterprise security program. Web applications offer clients and customers a convenient way to access their information and pay for services. Unfortunately, a company’s web...

Firewall, the Digital Gatekeeper Guarding Businesses Against Cyber Threats
Enterprisesecuritymag >> news

Firewalls are the digital shields that the corporates are relying on, to safeguard their businesses. This digital barricade stands as the foremost line of defense against cyber attacks. FREMONT, CA: The term firewall is not new in the...

Crucial Cybersecurity Practices for Small Business Owners
Enterprisesecuritymag >> news

FREMONT, CA: One of the contemporary threats to small enterprises comes straight from their online system. Reports indicate that small businesses have encountered a concerning 58 percent of cyber attacks in 2019. Small business owners have many...

7 Security Measures to Counter Cyberattacks
Enterprisesecuritymag >> news

FREMONT, CA: Organizations are trading their services and applications to the cloud as it significantly reduces their workload and is cost effective too. They are also using other technologies like machine learning (ML) and the internet of things...

Protecting against Web Application Attacks
Enterprisesecuritymag >> news

In this digital era, companies have more Internet-based applications than ever before, and these applications face exceptional volume and various types of threats. It’s more important that the WAFs (Web Application Firewall) provide superior...

Next-generation Firewall and Web Security Service: Weapon to Secure Cloud
Enterprisesecuritymag >> news

In this age of cloud revolution, the business houses want to shift their critical data to the cloud. LogicMonitor’s survey says that 83 percent of enterprise workloads will be directed to the cloud by 2020. But, the cloud platform allures...

Security Threats SMBs Face with Adoption of Cloud
Enterprisesecuritymag >> news

As SMBs continue facing legacy challenges such as absence of in-house specialized assets, they reliably battle with underfunded IT security spending plans and lack of implementation. While large organizations tend to be confident about being...

SMBs Underequipped to Deal with Cyber Attacks
Enterprisesecuritymag >> news

According to the 2018 SMB IT Security Report by Untangle, Small or Medium-Sized Businesses (SMBs) are equally, if not more, susceptible to cybersecurity attacks as any large enterprise. Untangle surveyed 350 SMBs and compiled data on IT trends as...

The State of Enterprise Security Budgets
Enterprisesecuritymag >> news

Data security is one of the biggest concerns of the 21st century as every market decision is driven by analyzing the structured and unstructured data pattern. According to the recent IANS survey, only 22 percent of the companies with annual...

Role of Predictive Analytics in Border Security
Enterprisesecuritymag >> news

Border security has been a top priority for most countries since the deadly terror strikes such as 9/11 and 26/11 took the world by storm. The border patrol agencies and the coastguards around the world stay on high alert and assess threats from...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Trends Impacting IT Infrastructure
Enterprisesecuritymag >> cxoinsights

John M. Daane, DoIT (Director of Information Technology) at Emerald Coast Utilities Authority

What do you see as a big challenge in technology to meet the challenges of your industry? There are things that make every industry provider slightly unique, even if they deliver the same service or product. It is the nature of doing business...

Protecting Legacy and Next-Gen Networks
Enterprisesecuritymag >> cxoinsights

Brad Boston, President & CEO, NetNumber

As the former CIO at Cisco, security was one of those concerns that kept me awake at night— specifically, protecting our infrastructure and intellectual property, and ensuring we protected the information of our employees, customers, and...

The Darkening World of DDoS
Enterprisesecuritymag >> cxoinsights

Matt Mahvi, CEO, Staminus Communications

Imagine a new financial technology company with media coverage and solid traction. The CTO has built amazing engineering and operations teams that have learned to scale the company infrastructure with the company’s viral growth. Clients are...

Myths and Truths: How CDNs can protect an Enterprise against DDoS Attacks
Enterprisesecuritymag >> cxoinsights

Leon Kuperman, CTO, Zenedge

A common CDN technique to thwart Layer 7 DDoS is page-caching. Since the CDN is caching content and/or pages for minutes or hours, any type of flood traffic to those pages will be absorbed by the CDN. This blocks the attack from ever making it to...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...