enterprisesecuritymag

it security

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services....

Consolidation of GSA IT
Enterprisesecuritymag >> cioviewpoint

David Shive, CIO, GSA

David Shive, CIO, GSA On July 30 of this year I was honored to be named the Chief Information Officer (CIO) of the United States General Services Administration (GSA). The role of CIO here at GSA comes with a legacy of innovation, early...

Orchestrating a Hybrid Cloud Using SaaS Solutions with On-premise Applications
Enterprisesecuritymag >> cioviewpoint

Bill VanCuren, CIO, NCR Corporation

Customers are demanding faster time to market, ease of use, and greater business agility. Because of these demands the industry has seen considerable growth in Software as a Service (SaaS) solutions. The heavy investment in cloud alternatives...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

Safeguarding Organizations through Risk-Based ISO Strategy
Enterprisesecuritymag >> cioviewpoint

Jerry Sullivan, CIO and VP, IT, Orlando Utilities Commission

Is your security department using Mall Cop tactics or a risk-based strategy? For most, I suspect your executive management’s perception prevails over the factual answer to this question. For others, behaving like the...

The Art of Cybersecurity
Enterprisesecuritymag >> cxoinsights

Ken Barnhart, Founder & CEO, The Occam Group, Ltd

Fredrick the Great once told his Generals, “That to defend everything is to defend nothing.”  There is no disputing that IT security and Risk Management professionals face an escalating and diversifying threat, but nobody has the...

Security Continues to Evolve as External Threats And Risks
Enterprisesecuritymag >> cioviewpoint

Brian Rice, CIO, Kellogg Company

Challenges in technology to meet enterprise needs in 2014 There is still a gap in how we drive insights from data, i.e. analytics. Building and maintaining  a leading analytics capability involves people, processes and technology, with...

3 IT Security Questions You Should be Asking, but Aren't
Enterprisesecuritymag >> cxoinsights

Christopher Clapp, CEO, Bluelock

The pace of IT security innovation is driven not by your business’s agenda. Rather, IT security innovation is driven at the pace of the latest hacks, attacks and impending threats. That always-changing, fast pace is near impossible for...

Examining Past and Future DDoS Attacks: What Enterprises Can Do to Prepare
Enterprisesecuritymag >> cioviewpoint

Tammy Moskites, CIO/CISO, Venafi

The Internet has technically been around since the 60’s, however academia has been using it since the 80s and commercial use actually began to grow rapidly in the 90’s. In the last 20 years the internet has grown over 100-times to well...

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services. However, a DDoS attack can disrupt the operation of even the most powerful...

Overcoming Security Challenges Associated with Big Data
Enterprisesecuritymag >> cxoinsights

John Armstrong, CMO, Zettaset Inc

The amount of digital data in the universe is growing at an exponential rate, doubling in size every two years. By 2020 the digital universe, the data we create and replicate annually, is estimated to reach 44 zeta bytes, or 44 trillion gigabytes....

No More Snake Oil: Shifting the Information Security Mentality
Enterprisesecuritymag >> cxoinsights

Jeremiah Grossman, Interim CEO, WhiteHat Security

When was the last time you made a major purchase without some type of guarantee? Whether that guarantee was for the quality of the product or the comfort of a return policy, chances are good you were probably more inclined to trust the vendor who...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Data-Driven Risk Management
Enterprisesecuritymag >> csoinsight

Ron Mehring, CISO, Texas Health Resources

When I was asked to write an article for CSO Outlook, I pondered what has been the prominent function or activity that has made the biggest difference in the way I lead  information security. By far, it has to be the employment of robust risk...

Macro Changes in the IT Security Industry
Enterprisesecuritymag >> cxoinsights

Richard Stiennon, Chief Research Analyst, IT-Harvest

On all technology fields, security is the only one that is almost completely driven by outside actors. Changes in ERP,CRM, storage, wireless, and computers are driven by competitive pressures, innovation, and the drive to make things smaller,...

Security Continues to Evolve as External Threats And Risks
Enterprisesecuritymag >> cioviewpoint

Brian Rice, CIO, Kellogg Company

Challenges in technology to meet enterprise needs in 2014 There is still a gap in how we drive insights from data, i.e. analytics. Building and maintaining a leading analytics capability involves people, processes and technology, with...

The Emerging Threat of Hacking-as-a- Service
Enterprisesecuritymag >> cxoinsights

Ondrej Krehel, MD & Founder, LIFARS

It’s not uncommon for CEOs and other C-level executives to view spending on IT infrastructure and cybersecurity as a necessary evil, while speaking very proudly of security efforts and roadmaps. Falsely believing that the dangers...

Identifying And Remediating IT Security Vulnerabilities
Enterprisesecuritymag >> cxoinsights

Benjamin Caudill, CEO, Rhino Security Labs

Challenge of a CIO Information security concerns are one of the biggest issues of any CIO today. Fortune 500 firms are constantly in the news as the latest victims in hacking scandals, and we provide the security assessments which prevent...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >> cxoinsights

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Why IT Security And SCADA/ Manufacturing Security Are Different
Enterprisesecuritymag >> cxoinsights

Eric Byres, CTO , Tofino Security, A Belden Brand

The Times, They are A’changing Industrial SCADA, ICS and manufacturing systems once ran on proprietary networks, used proprietary equipment, and were isolated from business networks and the internet. Life was simpler for both the IT manager...