enterprisesecuritymag

internet

Three Innovative Cybersecurity Technologies of 2018
Enterprisesecuritymag >> cxoinsights

The ongoing war between security experts and cyber actors have become a cat and mouse game. This era of digital transformation is affecting the cybersecurity, and therefore this ever-changing industry has to be more responsible regarding the cyber...

You Can't Protect What You Can't See: Gaining Visibility in Endpoint Security
Enterprisesecuritymag >> cxoinsights

Endpoint security is a crucial measure in which enterprises of all kinds need to implement today to curb security breaches. The wide acceptance of the Bring Your Own Device (BYOD) culture across the globe has not just ushered in an era of...

You Can't Protect What You Can't See: Gaining Visibility in Endpoint Security
Enterprisesecuritymag >> cioviewpoint

Endpoint security is a crucial measure in which enterprises of all kinds need to implement today to curb security breaches. The wide acceptance of the Bring Your Own Device (BYOD) culture across the globe has not just ushered in an era of...

Fostering the Culture of 'Security as a Valued Skill' to the Organization
Enterprisesecuritymag >> cxoinsights

Dr. Andreas Kuehlmann, SVP and General Manager, Synopsys Software Integrity Group

• What do you think are the biggest obstacles that technologists face in working in a more agile and outcomes based model? As organizations transition to a more agile and continuous development model, software security needs to be...

Fostering the Culture of 'Security as a Valued Skill' to the Organization
Enterprisesecuritymag >> cxoinsights

Dr. Andreas Kuehlmann, SVP and General Manager, Synopsys Software Integrity Group

• What do you think are the biggest obstacles that technologists face in working in a more agile and outcomes based model? As organizations transition to a more agile and continuous development model, software security needs to be...

Is Your Organization Ready For Drones?
Enterprisesecuritymag >> cxoinsights

Dr. Jonathan Reichental, CIO, City Of Palo Alto

I used to look at drones from a distance. Not anymore. 15-year old Luke Bannister had a proud and exuberant smile on his face. He had just flown the flight of his life hurtling at stunning speeds and taking steep corners, avoiding...

Artificial Intelligence Against Online Financial Fraud
Enterprisesecuritymag >> cxoinsights

Nicolas Miailhe, Co-Founder & President, The Future Society

Cybercrime and online financial fraud increased sharply between 2016 and 2018, with a total loss exceeding $3 billion in 2016 for fake president frauds, wire transfer scams and fake suppliers alone. The number of attacks carried out by sending a...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cxoinsights

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Time to Think Differently
Enterprisesecuritymag >> cxoinsights

Joseph DiBiase, Director Global Information Security, Interface

As with many of my CISO colleagues, our businesses have been moving (sometimes slowly and sometimes very quickly) to the cloud. We see constant introduction of new SaaS applications and utilization of PaaS and IaaS services from Amazon,...

Data is King! But are you treating it as one?
Enterprisesecuritymag >> cxoinsights

Madhu Maganti, Director-IT Assurance & Security Services, Doeren Mayhew

Evolution of Data Everyone and their big brother (no pun intended) is talking about data and more specifically, Big Data. Big Data is a technology buzzword that describes the current ecosystem in which there is significantly more data, and...

Data is King! But are you treating it as one?
Enterprisesecuritymag >> cxoinsights

Madhu Maganti, Director-IT Assurance & Security Services, Doeren Mayhew

Evolution of Data Everyone and their big brother (no pun intended) is talking about data and more specifically, Big Data. Big Data is a technology buzzword that describes the current ecosystem in which there is significantly more data, and...

Entering a New Era of Technology, with IT on your Terms
Enterprisesecuritymag >> cxoinsights

Dennis Curry, Executive Director & Deputy CTO, KONICA MINOLTA INC

In the age of digitalization, smart technology is no longer a threat confined to science fiction movies. Whilst technology may tend to disrupt and displace some people in the short term, technological changes to date have not had an overall...

The New Rise of Time Series Databases
Enterprisesecuritymag >> cxoinsights

Michael Risse, VP, Seeq Corporation

Time series data storage and management has long been an interesting but quiet market category. It’s been a multibillion-dollar business for years and a main stay in process manufacturing plants since the 1980s. But recently, the category...

The New Rise of Time Series Databases
Enterprisesecuritymag >> cxoinsights

Michael Risse, VP, Seeq Corporation

Time series data storage and management has long been an interesting but quiet market category. It’s been a multibillion-dollar business for years and a main stay in process manufacturing plants since the 1980s. But recently, the category...

The New Rise of Time Series Databases
Enterprisesecuritymag >> cioviewpoint

Michael Risse, VP, Seeq Corporation

Time series data storage and management has long been an interesting but quiet market category. It’s been a multibillion-dollar business for years and a main stay in process manufacturing plants since the 1980s. But recently, the category...

Facing the Drift T-Climb Security & Fraud's Everest
Enterprisesecuritymag >> cioviewpoint

Thierry Derungs, Chief Digital Officer, BNP Paribas Wealth Management

I remember… my first computer. In 1986, with my girlfriend (now my wife), we bought an incredibly expensive top personal computer with an extraordinary hard drive of 20Mb and the best modem to connect to Internet at… 14,4kbit/s....

IT Security Enters the Boardroom
Enterprisesecuritymag >> cioviewpoint

Bill Bradley, SVP, Cyber Engineering and Technology Services at CenturyLink[NYSE:CTL]

Not too long ago, IT issues such as cybersecurity and data protection were reserved for the back office – and rarely considered by organizations in driving revenue and aligning market strategy. These efforts even ran independent of...

Faster Risk Mitigation? Accelerate your Sector
Enterprisesecuritymag >>

Brad Wheeler, Vice President for IT & CIO, Indiana University Bloomington and Board Member of IU Health Bloomington Hospital

In 2016, my CIO colleagues and I in the Big Ten Academic Alliance realized the game was quickly changing in cybersecurity. Each of us is responsible for protecting the data and technology assets of large, multi-billion dollar universities, and we...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >>

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...

Finding Synergy Between Cybersecurity and Data Management
Enterprisesecuritymag >>

Lester Godsey, Chief Information Security Officer, City of Mesa, AZ

Arguably, the two ‘hottest’ trends in business, both cybersecurity and data management is often looked upon as separate strategic efforts within an organization. What many fail to realize is that they are not as disparate as they...