enterprisesecuritymag

marketing

How to Overcome the Three Obstructions in a DevOps Environment?
Enterprisesecuritymag >> cioviewpoint

Since the inception of DevOps, it has been addressed as one of the most debated subjects in IT circles. Some consider it a marketing fad, while others believe that it is here to transform the business sector. DevOps has evolved from a...

Cybersecurity - Its Significance in the Business
Enterprisesecuritymag >> cxoinsights

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack–struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity solutions....

iComply Launches Public Beta to Deliver Legitimacy to Security Token Platforms and Exchanges
Enterprisesecuritymag >> cxoinsights

VANCOUVER, British Columbia -  iComply Investor Services ("iComply"), a leading global regtech platform for digital finance and cryptocurrencies is announcing the launch of its public beta following the closure of a...

Global Data Protection Regulation...It's time.
Enterprisesecuritymag >> cioviewpoint

Michael Carr, JD, CISSP, CIPP, Director, Global IT Security & Compliance, Hillenbrand

For a couple of years now, I have read quite a few articles and have heard quite a few speakers refer to GDPR as the GLOBAL Data Protection Regulation. Those of us in the Information Security and Privacy profession know that the “G” in...

Silver Peak Named a Leader in 2018 Gartner WAN Edge Infrastructure Magic Quadrant
Enterprisesecuritymag >> cxoinsights

David Hughes, Founder and CEO, Silver Peak

For the past three years, the software-defined WAN or SD-WAN, has been one of the most talked about technology trends. By some estimations there are 60+ vendors, all marketing their products around the concept of SD-WAN, each vying to carve out a...

Cybersecurity-Its Significance in the Business
Enterprisesecuritymag >> cxoinsights

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack– struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity...

Data is the Lifeline of Today's Businesses; But Why Are So Many Business Leaders Still Making Guesswork?
Enterprisesecuritymag >> cioviewpoint

Eric Thain, General Manager, HK Express

There is no doubt on the importance of data in today’s businesses. The C-Suite recognizes the need to focus on data and in fact, data and analytics ranks the highest of the top five investment priorities for CEOs today (according to the...

Face as the New Data Point: The Good, Bad and the Ugly of Facial Recognition Technologies
Enterprisesecuritymag >> cioviewpoint

Riku Vassinen, Head of Digital Transformation, JWT Singapore

Although facial recognition technology has been around from 1960´s, it was again Apple who made this technology household name. After the launch of iPhone X, facial recognition opportunities have truly hit the mainstream. Besides locking...

The CIO's Role in Promoting Digital Transformation
Enterprisesecuritymag >> cxoinsights

Thomas Knapp, CIO, Waterstone Mortgage Corporation

All companies in every industry are challenged to define what digital transformation means for their enterprise, and how they will respond and develop strategies for adoption. In the mortgage industry where I operate, it is all about the...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >> cioviewpoint

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

Spring into Action! Growing Enterprise Architecture for Business Seasons
Enterprisesecuritymag >> cxoinsights

Martha Tartal, EA, United States Patent and Trademark Office

“Spring is the time of plans and projects.” Leo Tolstoy The sight of cherry blossoms may signify more than an end to cold weather. Depending on your organization’s budget cycle, the season of IT planning may also be in bloom....

Creating a
Enterprisesecuritymag >> cioviewpoint

Thomas Skill, Associate Provost & CIO, University of Dayton

Let’s face it, cybersecurity isn’t going to get any easier in 2018. As long as there is a financial or geo-political incentive, the threats will keep coming and the level of exploit sophistication will keep rising. Winning this battle...

U.S. Businesses and the General Data Protection Regulation
Enterprisesecuritymag >> cxoinsights

Greg Sparrow, SVP/GM, CompliancePoint

The General Data Protection Regulation (GDPR) is a European Union based regulation that requires businesses to protect the personal data and the privacy of any European Union (EU) natural persons when transactions occur within EU states. Data...

CIO Hall of Faces
Enterprisesecuritymag >> cxoinsights

Tom Basiliere, CIO, Provant

Among the many kingdoms in the popular “Game of Thrones” series, there is a secluded island that is home to an ancient temple and a clan of assassins. In this temple, there is a special room called the Hall of Faces. Arya, one of the...

Network analytics tools deepen with machine learning and AI
Enterprisesecuritymag >> cioviewpoint

Network analytics has been changing the overall businesses performance for quite some time. More companies are mastering the use of comprehensive analytics strategy to increase efficiency, gain a more significant competitive advantage, and boost...

Exploring the Capability of Blockchain and Big Data Collaboration
Enterprisesecuritymag >> cioviewpoint

Blockchain seems to be the buzzword around all thing technology and to endorse this modern technology even big data is embracing its decentralized feature. Companies are scrambling to assimilate the utilization of big data in their day-to-day...

Reading the Cloud Tealeaves in 2018
Enterprisesecuritymag >>

Sean Hackett, Research Director Cloud and SaaS, IDC

The key to successfully reading the cloud tealeaves in 2018 will center on one’s ability to more deeply understand the “why” of adoption and the “how” of implementation. There is no question that Cloud adoption for...

A People-First View of Investing in Innovation
Enterprisesecuritymag >>

Navin Chaddha, Managing Director, Mayfield

As an alum of IIT, serial entrepreneur, venture investor, and lifelong tech enthusiast, I’m always excited about innovation. However, while there are plenty of emerging technologies I am keeping a close eye on—from the projected end of...

The Power of Artificial Intelligence (AI)
Enterprisesecuritymag >>

Aaron Gette, CIO, The Bay Club Company

If you’re an avid fan of HBO's Silicon Valley, as I am, you may have recently downloaded the iOS app “Not Hotdog,” that was introduced on the show and developed in real life using real AI, in a ruse of ingenious marketing....

Why Artificial Intelligence Will Empower the CIO
Enterprisesecuritymag >>

Gregory B Morrison, SVP & CIO, Cox Enterprises

Since the dawn of mainframe computing, CIOs have marshaled troves of data—gathering, using and protecting information to advance the company’s strategic objectives. As technology evolves, so do our methods. The widespread digitization...