enterprisesecuritymag

legal

Blockchain Features That can Rule in future
Enterprisesecuritymag >> cxoinsights

Blockchain Technology is responsible for building an ecosystem of solutions for many industries. Blockchain technology has proved its mettle by providing able security for bitcoins. Enterprises across many industries are looking for ways to...

Scaling a Security Program with MSSPs
Enterprisesecuritymag >> cioviewpoint

Jeffrey W. Brown, CISO, Life & Retirement, AIG

Outsourced information security services and managed security services providers (MSSPs) are a necessary component of most cybersecurity programs. Even large-scale financial institutions with fully-staffed internal security teams tend to have...

The Great CIO Myth
Enterprisesecuritymag >> cxoinsights

David Tamayo, CIO, DCS Corporation

Recently, after participating in a panel of so-called “experts” at the local chapter of the Society for Information Management, a young IT manager came afterwards to ask me, “How can I become a great defense industry CIO?”...

Establishing a Best-in-Class Global Security Infrastructure
Enterprisesecuritymag >> cioviewpoint

Tim Callahan, SVP, Global Security, and Global Chief Security Officer (CISO), Aflac

Forming a global security infrastructure is never a one-size-fits-all approach, but proven methods can help.  Aflac implemented a global security organization under its general counsel to ensure global view and reach. This...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >> csoinsight

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

Preventing Cyber-Attacks in Universities with Operational Collaboration
Enterprisesecuritymag >> cxoinsights

Michael Corn, Deputy CIO & CISO, Brandeis University

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging...

Security and Privacy: Stop Plotting Against Each Other
Enterprisesecuritymag >> cioviewpoint

Ruby Zefo, VP, Law and Policy Group, Intel Corporation

When I first started working as a grown up, PCs were brand new. I shared one with my office neighbor, mostly for word processing, creating spreadsheets, and creating presentations – which I would then take on a floppy disk to a plotter, a...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >> vendor

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

QBRICS, Inc.: Enterprise Blockchain Platform
Enterprisesecuritymag >>

Brennan Bennett, Co-Founder & COO

QBRICS, Inc envisions creating a blockchain adoption platform and becoming a blockchain solution provider with unique features like quantum safe encryption, artificial intelligence-enabled smart contracts, interoperability between different type...