enterprisesecuritymag

hacking

Vulnerable times
Enterprisesecuritymag >> cioviewpoint

Technology is continuously getting integrated into every aspect of our lives and the dependency is rising with every passing day. At the same time, the risk involved in case of technological failure is quite high. In the past quarter of the...

The Weakest Link
Enterprisesecuritymag >> cxoinsights

Mitchell Taylor, CIO/Director of IT & Security, CalSheets LLC

You may remember a game show called The Weakest Link. It involved a group of nine contestants working as a team to try and win money. Each member of the group had to answer questions, and the goal was to put a chain of correct answers together...

The Employee-An Organization's Security Downfall or a Hidden Security Gem
Enterprisesecuritymag >> cxoinsights

Gordon MacKay, EVP and CTO, Digital Defense

Several years ago, while on a walk, my lively Pomeranian took notice of a few birds. They also took notice of her and nearly immediately took flight, reacting to what they perceived as impending danger. This was nature’s warning system in...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

The Emerging Threat of Hacking-as-a- Service
Enterprisesecuritymag >> cxoinsights

Ondrej Krehel, MD & Founder, LIFARS

It’s not uncommon for CEOs and other C-level executives to view spending on IT infrastructure and cybersecurity as a necessary evil, while speaking very proudly of security efforts and roadmaps. Falsely believing that the dangers...

The Employee-An Organization's Security Downfall or a Hidden Security Gem
Enterprisesecuritymag >> vendor

Gordon MacKay, EVP and CTO, Digital Defense

Several years ago, while on a walk, my lively Pomeranian took notice of a few birds. They also took notice of her and nearly immediately took flight, reacting to what they perceived as impending danger. This was nature’s warning system in...

Deloitte: Multi-pronged Approach for Information Security Assurance
Enterprisesecuritymag >>

Chris Ruggeri, Principal with Deloitte Risk and Financial Advisory

Deloitte, a pioneer among the information security solution providers, is a professional network of multinationals; it is also the world's largest professional services network with revenue and a number of professionals. It is one of the "Big...