enterprisesecuritymag

infrastructure

Silver Peak Named a Leader in 2018 Gartner WAN Edge Infrastructure Magic Quadrant
Enterprisesecuritymag >> cxoinsights

David Hughes, Founder and CEO, Silver Peak

For the past three years, the software-defined WAN or SD-WAN, has been one of the most talked about technology trends. By some estimations there are 60+ vendors, all marketing their products around the concept of SD-WAN, each vying to carve out a...

Securing Your Industrial Control Systems Today
Enterprisesecuritymag >> cxoinsights

Richard Bussiere, Director, Product Management APAC, Tenable

In March 2018, the US-CERT published an alert that a multi-stage campaign against critical infrastructures was being conducted by Russia against targets in the United States. This alert was the result of detailed analysis of the attacks...

Why Governors Are Your Cybersecurity Allies
Enterprisesecuritymag >> cxoinsights

David Forscey, Senior Policy Analyst, Cybersecurity, Homeland Security & Technology, National Governors Association

This summer, North Dakota Governor Doug Burgum announced a new partnership with a California cybersecurity company that donated $1.6 million to expand cybersecurity education at Bismarck State College. Public-private partnerships like this are...

Combating Cyber Menaces by Fortifying Cybersecurity
Enterprisesecuritymag >> cioviewpoint

Joey J. Smith, VP & CISO, Schnuck Markets, Inc.

Cybersecurity has become a major concern for companies as hacking events have increasingly run rampant. Despite the constant efforts of companies to meet security standards, these events continue unabated. I’d like to suggest that companies...

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >> cioviewpoint

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

The CIO's Role in Promoting Digital Transformation
Enterprisesecuritymag >> cxoinsights

Thomas Knapp, CIO, Waterstone Mortgage Corporation

All companies in every industry are challenged to define what digital transformation means for their enterprise, and how they will respond and develop strategies for adoption. In the mortgage industry where I operate, it is all about the...

Enterprise Security: What Does it Really Mean?
Enterprisesecuritymag >> cioviewpoint

Kevin Powers, Founding Director, Boston College

Whether you’re at a cybersecurity conference, participating in a webinar, or reading an article like this one, you are often bombarded with these catchy sayings regarding enterprise security: “It’s a team sport”;...

The Digital Transformation Trifecta: Cloud, IoT, and Big Data
Enterprisesecuritymag >> cioviewpoint

Joe Topinka, CIO, SnapAV

Staying relevant is proving difficult for many companies as the digital transformation tsunami hits the shores of most businesses. Balancing between the hype and realities of the cloud, IoT, and big data is confusing for C-suite executives....

Four Reasons Why You Need a Third-Party Security Assessment
Enterprisesecuritymag >> cioviewpoint

Jeff Cann, CIO, Encore Electric, Inc.

Recently, social media giant Facebook announced that a security breach exposed the accounts of 50 million of its users. There will be significant impacts caused by this breach and it is another example of why information security is scaring not...

Business Goals for Implementing a Vulnerability Management Solution
Enterprisesecuritymag >> cioviewpoint

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

Ultimately, the goal is to avoid a breach and keep our company off the news headlines. That’s a given for every CISO. But we also have business availability goals that are typically defined by service-level agreements (SLAs). "A tool...

Business Goals for Implementing a Vulnerability Management Solution
Enterprisesecuritymag >>

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

Ultimately, the goal is to avoid a breach and keep our company off the news headlines. That’s a given for every CISO. But we also have business availability goals that are typically defined by service-level agreements (SLAs). "A tool...

Enterprise Security on Cloud: A Futuristic Assessment
Enterprisesecuritymag >>

Security analytics is completely transforming the way companies do their business. Various changes and new trends in technologies have resulted in changing the way work is done in organizations. As a result of these drastic changes, companies have...

Improving data security for AWS servers
Enterprisesecuritymag >>

With an aim to reduce business cost while simultaneously boosting scalability, collaboration, and digitization, every organization is moving its entire IT infrastructure to the cloud. Amazon Web Services (AWS), one of the most popular cloud...

Cybersecurity Market - A Second Coming for AI?
Enterprisesecuritymag >>

In today’s advancing digital world, organizations, irrespective of the vertical, are faced with constantly evolving zero-day threats and are in dire need to address them rapidly. As the complexity of a cyber attack increases, so does the...

All about Google's Enhanced Cloud Security Tools
Enterprisesecuritymag >>

Google’s announcement of a new set of tools and capabilities for its Google Cloud Platform (GCP) paired with the availability of several new products and features within was aimed at enhancing its cloud security environment. Security...

Effective Ways to Fortify Payment Processing
Enterprisesecuritymag >>

With changing trends in the retail landscape, the possibilities of security breaches and data theft are higher than ever before today. While customers are usually unaware of the process to secure their confidential data such as credit card...

Why Your Approach to Cybersecurity Needs to Be Proactive Rather Than Reactive
Enterprisesecuritymag >>

Cybersecurity is as essential as engineering a unique product suite and enterprises today simply can’t afford to overlook security. Going by the age-old adage ‘prevention is better than cure’, organizations should implement...

Cloud Management Platforms that are Spearheading Innovation
Enterprisesecuritymag >>

Cloud management platforms are technologies utilized to operate and monitor data, services, and applications on the cloud. In determining the most efficient cloud management software, a number of features, such as flexibility, security,...

Cloud Security: The Challenges
Enterprisesecuritymag >>

The soaring popularity of the cloud has resulted in steady adoption rates, which can be primarily attributed to no more hardware costs, long software release cycles, or the hassles of managing multiple physical data centers. As the benefits of...

Blockchain for Enterprise Security
Enterprisesecuritymag >>

When it first came out, blockchain became the buzzword for the transaction infrastructure for Bitcoin and other cryptocurrencies. But, lately, many tech-savvy industry leaders purview this ledger solution as the bridge for the security gaps in...