enterprisesecuritymag

it security

Enterprise Security: What Does It Really Mean?
Enterprisesecuritymag >> cioviewpoint

Kevin Powers, Founding Director, Boston College

Whether you’re at a cybersecurity conference, participating in a webinar, or reading an article like this one, you are often bombarded with these catchy sayings regarding enterprise security: “It’s a team sport”;...

Four Reasons Why You Need a Third-Party Security Assessment
Enterprisesecuritymag >> cioviewpoint

Jeff Cann, CIO, Encore Electric, Inc.

Recently, social media giant Facebook announced that a security breach exposed the accounts of 50 million of its users. There will be significant impacts caused by this breach and it is another example of why information security is scaring not...

Security Threats SMBs Face with Adoption of Cloud
Enterprisesecuritymag >> cxoinsights

As SMBs continue facing legacy challenges such as absence of in-house specialized assets, they reliably battle with underfunded IT security spending plans and lack of implementation. While large organizations tend to be confident about being...

Techno Security & Digital Forensics Conference 2018 - San Antonio
Enterprisesecuritymag >> cxoinsights

The Texas edition of Techno Security & Digital Forensics Conference will take place September 17-19 at the Hyatt Regency in San Antonio, TX. This event provides a unique education experience that blends together the digital forensics and...

Understanding The New Endpoint Security Features For Your Enterprise
Enterprisesecuritymag >> cxoinsights

Enterprise IT security teams subjects to approximately  5,000 to 7,000 software vulnerabilities per year. Security personnel has to assess their organization's digital assets, evaluate their competitors' motives and strategies and be...

No More Snake Oil: Shifting the Information Security Mentality
Enterprisesecuritymag >> cxoinsights

Jeremiah Grossman, Interim CEO, WhiteHat Security

When was the last time you made a major purchase without some type of guarantee? Whether that guarantee was for the quality of the product or the comfort of a return policy, chances are good you were probably more inclined to trust the vendor who...

Achieving Information Security in Healthcare
Enterprisesecuritymag >> cioviewpoint

Dan Costantino, CISO, Penn Medicine

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs on a continual basis as it matures. It is critical to scrutinize whether you have...

SMBs Underequipped to Deal with Cyber Attacks
Enterprisesecuritymag >> cxoinsights

According to the 2018 SMB IT Security Report by Untangle, Small or Medium-Sized Businesses (SMBs) are equally, if not more, susceptible to cybersecurity attacks as any large enterprise. Untangle surveyed 350 SMBs and compiled data on IT trends as...

Need for Digital Forensics and Incident Response Teams
Enterprisesecuritymag >> cxoinsights

Digital forensics is the branch of forensic science that deals with the collection and examination of digital evidence to identify why, when and how a criminal or hacking activity has occurred. Though the use of digital forensics in the corporate...

Importance of an Identity and Access Management Solution
Enterprisesecuritymag >> cxoinsights

The current IT scenario has made it imperative for every user to access information easily and fast, irrespective of time or location. Consequently, organizations are experiencing the need to provide users seamless access to information....

Cyber Incident and Breach Response Planning: Is It an Option Any Longer?
Enterprisesecuritymag >> cxoinsights

Jim Holtzclaw, SVP, Marsh Risk Consulting’s Cybersecurity Consulting and Advisory Services Practice

Cyber threats and related breach events are a fact of life for today’s organizations. Almost every business relies on the internet or utilizes connected technologies in some way in their operations or to generate revenue. A well-developed...

IT Security Enters the Boardroom
Enterprisesecuritymag >> cxoinsights

Bill Bradley, SVP, Cyber Engineering and Technology Services at CenturyLink[NYSE:CTL]

Not too long ago, IT issues such as cybersecurity and data protection were reserved for the back office – and rarely considered by organizations in driving revenue and aligning market strategy. These efforts even ran independent of...

The State of Enterprise Security Budgets
Enterprisesecuritymag >> cxoinsights

Data security is one of the biggest concerns of the 21st century as every market decision is driven by analyzing the structured and unstructured data pattern. According to the recent IANS survey, only 22 percent of the companies with annual...

The Power of Artificial Intelligence (AI)
Enterprisesecuritymag >>

Aaron Gette, CIO, The Bay Club Company

If you’re an avid fan of HBO's Silicon Valley, as I am, you may have recently downloaded the iOS app “Not Hotdog,” that was introduced on the show and developed in real life using real AI, in a ruse of ingenious marketing....

Expanding Role of the CIO with Smart, Connected Products
Enterprisesecuritymag >>

Steve Dertien, Office of the CTO, PTC

With each new wave of technological innovation, IT becomes a significant facilitator in enabling companies to leverage this technology to capture a first mover advantage, operational effectiveness and competitive advantage.  Twice before over...

Banking on Trust: The Role of Security
Enterprisesecuritymag >>

Tom Watson, VP IT/Digital, Global CISO, Sealed Air Corporation

Corporate security has often been an afterthought in many industries. Although companies are quick to introduce new software applications, improve network architecture, and adopt cloud for storing data, security aspects of these technologies is...

Cybersecurity in the Workplace: Transforming Employee Error into Empowerment
Enterprisesecuritymag >>

Rob Cataldo, VP of Enterprise Sales, Kaspersky Lab

As cyberattacks become more sophisticated in nature, the hackers behind these threats continue to leverage a simple, effective attack method to infiltrate computer networks–the evergreen human factor. A recent study found that uninformed or...

Seven security priorities for 2017
Enterprisesecuritymag >>

Jeff Harris, VP of security solutions, Ixia

The enterprise IT security landscape changed dramatically during 2016. Expansion into more clouds, the addition of industrial IoT, and marked increases in virtual deployments resulted in more devices, more locations, and more environments for...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >>

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Is Your Corporation Suffering From 'Data Sprawl'?
Enterprisesecuritymag >>

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3 Information today moves at a breakneck speed and the amount of data produced worldwide every day is staggering. With each new device and system added to a network, a...