enterprisesecuritymag

ip address

Active Countermeasures Unveils New Versions of Rita and AI-Hunter
Enterprisesecuritymag >> cxoinsights

Chris Brenton, COO

One of the significant limitations of many security attestations is that they do not verify if a network being evaluated contains compromised systems. Today's security tools are incapable of distinguishing between normal network traffic and...

Improving Security with SIEM Reports and Alerts
Enterprisesecuritymag >> cxoinsights

Coordination is of foremost importance with regard to managing a data center efficiently. In addition to monitoring performance trends, system access, and power consumption on a daily basis, security information and event management (SIEM)...

How to get your information security to lift more weight
Enterprisesecuritymag >> cxoinsights

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security

Information security sometimes appears to be stuck, still suffering from the same basic problems: weak passwords, unpatched vulnerabilities, and too much (or too little) data to make sense of what is really happening. While it is fascinating to...

DDoS Attack... for Dummies!
Enterprisesecuritymag >> cxoinsights

Thierry Derungs, Chief Digital Officer, BNP Paribas Wealth

DDoS attack shuts down key FinTech Sites But be cautious with "big titles" like in this article it could make you thinking that these FinTechs are weak... Understanding exactly the kind of attack is important. In this case, it was not...

Cybersecurity in 2018: Three Trends to Act On
Enterprisesecuritymag >> cxoinsights

Andy Hammond, strategist and evangelist, Vice President Business Development, SSH Communications Security

You know the phrase “Hindsight is 20/20,” but wouldn’t it be handy—particularly in the arena of cybersecurity—to be able to see into the future with greater clarity? Organizations the world over are gearing up for a...

ONE SIZE FITS Al Cyber Security Program
Enterprisesecuritymag >> cxoinsights

Richard Rushing, CISO, Motorola

Over the last few years, we have discovered how hard information security has become, as the attackers have so many attack vectors into an organization. Some even have more resources and capabilities than many organizations that are being...

Cybersecurity Strategy - Do You Have One Yet?
Enterprisesecuritymag >> cxoinsights

Dina Moskowitz, CEO and Founder, SaaSMAX Corp

Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats,...

Securing the Internet of Things: Best Practices for the Enterprise
Enterprisesecuritymag >> cxoinsights

Phil Skipper, Head of Business Development, Vodafone Internet of Things

Businesses across every industry– from healthcare, to manufacturing, to automotive, to retail – are adopting powerful Internet of Things (IoT) technologies to gain better data insights from physical devices and make realtime...

How to get your information security to lift more weight
Enterprisesecuritymag >> cxoinsights

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security Information security sometimes appears to be stuck, still suffering from the same basic problems: weak passwords, unpatched vulnerabilities, and too much (or too little)...

Taking control of IT Operations through the Critical Security Controls
Enterprisesecuritymag >> cxoinsights

Matthew J. Harmon, Principal Consultant, IT Risk Limited

These systems become a pivot point for infiltration, allowing for escalation of privileges and network visibility through a patient and opportunistic approach slowly spreading through the environment. The strategy to prevent this type of...

Taking control of IT Operations through the Critical Security Controls
Enterprisesecuritymag >> cxoinsights

Matthew J. Harmon, Principal Consultant, IT Risk Limited

These systems become a pivot point for infiltration, allowing for escalation of privileges and network visibility through a patient and opportunistic approach slowly spreading through the environment. The strategy to prevent this type of...

How to get your information security to lift more weight
Enterprisesecuritymag >> cxoinsights

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security

Information security sometimes appears to be stuck, still suffering from the same basic problems: weak passwords, unpatched vulnerabilities, and too much (or too little) data to make sense of what is really happening. While it is fascinating to...

Myths and Truths: How CDNs can protect an Enterprise against DDoS Attacks
Enterprisesecuritymag >> cxoinsights

Leon Kuperman, CTO, Zenedge

A common CDN technique to thwart Layer 7 DDoS is page-caching. Since the CDN is caching content and/or pages for minutes or hours, any type of flood traffic to those pages will be absorbed by the CDN. This blocks the attack from ever making it to...

How to get your information security to lift more weight
Enterprisesecuritymag >> cxoinsights

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security

Information security sometimes appears to be stuck, still suffering from the same basic problems: weak passwords, unpatched vulnerabilities, and too much (or too little) data to make sense of what is really happening. While it is fascinating to...

Taking control of IT Operations through the Critical Security Controls
Enterprisesecuritymag >> vendor

Matthew J. Harmon, Principal Consultant, IT Risk Limited

These systems become a pivot point for infiltration, allowing for escalation of privileges and network visibility through a patient and opportunistic approach slowly spreading through the environment. The strategy to prevent this type of...

Security of Cloud Computing
Enterprisesecuritymag >> vendor

Anthony Scarola, CISSP, Director of Technical Information Security, TowneBank

Ugh, “cloud”. The term and how it has been applied to hosted computing services is disappointing. Hosting providers have repurposed the cloud placeholder— typically used by network engineers to depict complex, yet understood...

SwiftSafe: Beating the Hackers in Their Own Game
Enterprisesecuritymag >> vendor

Akhil Rapelli, Information Technology Security Analyst & CTO

SwiftSafe specializes in cybersecurity, securing the IT assets and infrastructures, providing enterprise security services, particularly in auditing and testing. The company was found on basic principles and motives of spreading awareness,...

Active Countermeasures: Threat Hunting: Delivered Right Out of the Box
Enterprisesecuritymag >> vendor

Chris Brenton, COO

Active Countermeasures, a foremost security analytics provider, consists of a group of like-minded geeks that believe in giving back to the security community. The company achieves this by providing free training and both open source and...

Biometric Signature-ID: Advanced Biometrics for Foolproof Authentication
Enterprisesecuritymag >>

Jeff Maynard, CEO, President, & Founder

Biometric Signature ID is a leading manufacturer of biometric ID verification software and multifactor authentication solutions provider. Its innovative BioSig-ID identity solution authenticates individuals with a unique password drawn using a...

CapLinked: The Intuitive Virtual Data Room
Enterprisesecuritymag >>

Christopher Grey, COO & Co-founder

CapLinked is an enterprise security startup which provides secure virtual data rooms and document management platform for working on asset sales, mergers, financing, and acquisitions which secure workspaces. CapLinked serves as a central platform...