enterprisesecuritymag

homeland-security

How can Facial Recognition Technology Serve Humans?
Enterprisesecuritymag >> cxoinsights

Technologies certainly stand in a better position to match an image with a person, as it is time-consuming and difficult for staff. FREMONT, CA: Customs and border protection (CBP) insiders have a hard time accepting advances in the...

How Do Healthcare CIOs Address IIoT Threats?
Enterprisesecuritymag >> cxoinsights

IIoT has enormous potential to transform the healthcare industry, although it is surrounded by threats in different forms and has to be addressed adequately. Fremont, CA: The necessity to save human lives elevates beyond limits with the onset...

Healthcare and its Vulnerability to Cyber Threat
Enterprisesecuritymag >> cxoinsights

Isabel Fox, General Partner and Co-Founder, Luminous Ventures

As an investor, we are hugely excited by the succession of breakthrough technologies we see coming out of the healthcare space where start-ups are, undoubtedly, the future of such enterprise. But on top of the financial pressures of scaling up,...

Top 4 Ways to Optimize Application Container Security
Enterprisesecuritymag >> cxoinsights

Application containers are becoming popular as they allow easy building, packaging and promoting applications. However, it is a challenge to ensure maximum container security. Fremont, CA: Container-based technology is increasingly being...

Blockchain - A U.S. Customs and Border Protection Perspective
Enterprisesecuritymag >> cioviewpoint

Vincent Annunziato, Director, Business Transformation and Innovation Division, Trade Transformation Office, Office of Trade, Customs and Border Protection

As blockchain technology matures, it is important for companies and individuals to move beyond the hype. U.S. Customs and Border Protection (CBP), charged with facilitating an average of more than $3 trillion in legitimate trade every year while...

How Will Innovation Impact the Practice of Cybersecurity?
Enterprisesecuritymag >> cioviewpoint

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

There is a plethora of new and exciting tools and innovation that can be used to support your cybersecurity efforts. Some, like moving to the cloud, will require a change in thinking and posture while others, such as AI, will potentially change...

Securing Your Industrial Control Systems Today
Enterprisesecuritymag >> cxoinsights

Richard Bussiere, Director, Product Management APAC, Tenable

In March 2018, the US-CERT published an alert that a multi-stage campaign against critical infrastructures was being conducted by Russia against targets in the United States. This alert was the result of detailed analysis of the attacks...

Enterprise Security on Cloud: A Futuristic Assessment
Enterprisesecuritymag >> cioviewpoint

Security analytics is completely transforming the way companies do their business. Various changes and new trends in technologies have resulted in changing the way work is done in organizations. As a result of these drastic changes, companies have...

Making the Right Investment
Enterprisesecuritymag >> cioviewpoint

Brad Peterson, EVP & CIO, Nasdaq

For us, our spending has continued to increase for information security over the past three years while our overall technology spending has remained flat. This area and the new data technologies have been the growth areas for us. In terms of...

Information Security against Cyber attacks
Enterprisesecuritymag >> cioviewpoint

Brad Peterson, EVP & CIO/CTO, Nasdaq

What are you spending on information security? What percentage of your spending on cybersecurity tools is on legacy vendors, and what percentage is on newer technology? For us, our spending has continued to increase for information security...

For DDoS-Hope is NOT a Strategy!
Enterprisesecuritymag >> cioviewpoint

Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

So pervasive even into corporate boardrooms, the business magazine Forbes, rana primer about the subject in March of 2017; Distributed Denial of Service (DDoS) attacks are on the rise and NOT run of the mill anymore! Before we get started on...

Do IT Professionals Have a Social Responsibility?
Enterprisesecuritymag >> cxoinsights

Sam Segran, CIO, Texas Tech University

Except for a few involved researchers and interested parties, the world hardly noticed the advent of the internet in 1969 (as ARPANET) when the first host-to-host message was communicated from the University of California, Los Angeles (UCLA) to...

Healthcare Cybersecurity: Start with a Plan
Enterprisesecuritymag >> cioviewpoint

William Phillips, Sr. VP & CIO, University Health System, San Antonio, Texas

Today’s healthcare landscape continues to become more complex each day. The CIO’s role is ever-expanding with additional responsibilities. At the top of this list is the protection and security of the systems and data of the...

FDA Cybersecurity Defenses and Enhancements within the Threat Landscape
Enterprisesecuritymag >> cxoinsights

Todd Simpson, CIO, FDA

The U.S. Food and Drug Administration (FDA) reliesrely on a strong enterprise security system to help the agency fulfill its global public health mission. In September 2016, the Government Accountability Office (GAO) issued a report, “FDA...

The Weakest Link
Enterprisesecuritymag >> cioviewpoint

Mitchell Taylor, CIO/Director of IT & Security, CalSheets LLC

You may remember a game show called The Weakest Link. It involved a group of nine contestants working as a team to try and win money. Each member of the group had to answer questions, and the goal was to put a chain of correct answers together...

All Identities Matter
Enterprisesecuritymag >> csoinsight

Daniel Krantz, CEO, Real-Time Technology Group

Clear and Present Insider Threat Now more than ever before, risk managers are faced with increasing physical security threats. Irrespective of the political debates, facility owners and operators are forced to implement changes in their...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >>

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

All Identities Matter
Enterprisesecuritymag >>

Daniel Krantz, CEO, Real-Time Technology Group

Clear and Present Insider Threat Now more than ever before, risk managers are faced with increasing physical security threats. Irrespective of the political debates, facility owners and operators are forced to implement changes in their...

Implementing an effective Public Sector Cyber Security Program
Enterprisesecuritymag >>

Peter Ambs, CIO, City of Albuquerque

It’s not easy being today’s CIO or CISO in a government organization. While budgets shrink, we are tasked with being relevant and innovative while ensuring we have dependable technology services that provide optimized public services,...

Security is Only as Good as Your Weakest Link
Enterprisesecuritymag >>

Sam Schoelen, CIO/ CTO /CSO, Continental Resources

There is a saying “a chain is only as strong as its weakest link”, so too does it apply to data security. Today’s IT managers are spending a majority of their budget on data security, it seems they are buying more and...