enterprisesecuritymag

infrastructure

Strategies for an Effective Blockchain Implementation
Enterprisesecuritymag >> cioviewpoint

The security feature of blockchain is making it a lucrative technology for many industries and government organizations. The defense sectors in many countries are looking into the security challenges that come with adopting the...

Leveraging Drones to Increase Safety and Productivity
Enterprisesecuritymag >> cioviewpoint

Hugo Vasquez, Deputy CIO, The AES Corporation

Imagine you need to inspect and possibly repair a large and critical electrical wire. There are hospitals, businesses and households depending on your work. Now imagine that a wire is suspended 120 feet up in the air and you are teetering next to...

Drones are Coming to your Business
Enterprisesecuritymag >> cxoinsights

Tom Basiliere, CIO, Provant Health

Humans have been using machines to perform difficult and dangerous tasks since the beginning of time. Machines controlled by hand evolved to machines that could be operated at a distance and, with the invention of flight and radio, machines that...

The New Era of Unmanned Aircrafts: Drones
Enterprisesecuritymag >> cioviewpoint

Chris Proudlove, SVP, Global Aerospace

As we enter 2018, the drone operating industry is settling into three categories, each trying to make their way through a set of rules that, although permissive for line-of-sight operations, limits what many companies hope to achieve with the...

CDNs for Satiating Online Video Demand
Enterprisesecuritymag >> cxoinsights

The increasing dominance of the Internet and the demand for mobility have raised the user expectations to an unprecedented level. Content users expect not only engaging and relevant content but also delivery at the lightening speed. As the video...

An Introduction to Linux Container and Threats
Enterprisesecuritymag >> cxoinsights

The idea of container technology first appeared around the 2000s, as a technology that allows partitioning of FreeBSD system into multiple subsystems. Then, the concept of Jails was developed as safe environments that a system admin could share...

CIOs Shouldn't See OpenStack and Public Clouds as an Either/Or Proposition
Enterprisesecuritymag >> cxoinsights

Shelton Shugar, CIO, Barclaycard [NYSE:BCS-D]

With over 20+ million lines of codes and over 30,000 people in the community, OpenStack has easily gained adoption across a variety of industries and proved its viability and reliability for production environments. It has become the fastest...

The Race against Cybercrime: Five Fundamental Strategies to Get you to the Finish Line
Enterprisesecuritymag >> cioviewpoint

Destiny Bertucci, Head Geek™, SolarWinds

Singapore has seen tremendous progress in transforming its landscape and integrating with modern technology. The understanding that digital transformation is vital to growth—not to mention convenience and added efficiencies—is deeply...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cxoinsights

Vennard Wright, CIO, WSSC

As consumers and recipients of services from utilities, our least favorite thing about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

How Will Innovation Impact the Practice of Cybersecurity?
Enterprisesecuritymag >> cxoinsights

John Felker, Director, National Cybersecurity and Communications Integration Center, U.S. Department of Homeland Security

There is a plethora of new and exciting tools and innovation that can be used to support your cybersecurity efforts. Some, like moving to the cloud, will require a change in thinking and posture while others, such as AI, will potentially change...

The Guardian of Electric Utilities
Enterprisesecuritymag >> cioviewpoint

Bill Lawrence, NERC Vice President, Chief Security Officer, and Director of the Electricity Information Sharing and Analysis Center

The Electricity Information Sharing and Analysis Center (E-ISAC), run by the North American Electric Reliability Corporation,is using twokey tools to reduce cyber and physical security risk to the enterprise systems of electric utilities. The...

Evolving and Strengthening Organizational Security
Enterprisesecuritymag >> cioviewpoint

Sylvia Acevedo, CEO, Girl Scouts of the USA

In our ever-more data-driven world, information security is everyone’s problem-from individuals navigating the web who need to understand how to protect their personal information online, to businesses-large and small - protecting their...

Blockchain Possibilities and Pitfalls
Enterprisesecuritymag >>

Thomas Gresham, Assistant Director, Information & Communications Technology, County of Santa Barbara

Blockchain technology is a rapidly growing topic of interest. Companies are racing to embrace the trend but should take into account the many pitfalls that could arise. Blockchain Technology Overview Blockchain at a basic concept is a...

Securing IoT Devices to Avert DDoS Attacks
Enterprisesecuritymag >>

Will Long Sr., VP & CISO, IS Operations, Children’s Health

Traditionally, distributed denial of service (DDoS) attack was limited to one particular device or desktop. With the enormous growth and implementation of IoT devices including home routers, camcorders and DVR, these attacks have become much more...

The Impact of the Cloud on Information Security
Enterprisesecuritymag >>

Vennard Wright, Chief Information Officer, WSSC (Washington Suburban Sanitary Commission)

As a CIO for the Wash­ington Suburban Sanitary Commission (WSSC), which is a 100-year-old public wa­ter utility serving 1.8 million customers in Maryland, across 475,000 accounts, I’ve realized the challenge of balancing evolving...

Significance of Cloud Security in Businesses
Enterprisesecuritymag >>

Cloud technology has been under scrutiny by both critics and experts. Cybercrime industry has hindered the adoption of the technology, but experts still believe that it is more secure than any other private communication and IT network linked to...

Cognitive Computing of AI, IoT in CyberSecurity
Enterprisesecuritymag >>

According to Forcepoint’s Cybersecurity Predictions Report, connected systems put critical data and intellectual property at a security risk. The report suggested that there exist seven significant areas of cybersecurity risk after...

Cyber Attacks to Watch out for in 2019
Enterprisesecuritymag >>

Cybersecurity witnessed a rapid multiplication of high-profile breaches and phishing attacks and in 2019 there may be the more of same.  The companies must secure their privileged accounts, eliminate excessive user privileges, prioritize...