enterprisesecuritymag

microsoft

Strategies for an Effective Blockchain Implementation
Enterprisesecuritymag >> cioviewpoint

The security feature of blockchain is making it a lucrative technology for many industries and government organizations. The defense sectors in many countries are looking into the security challenges that come with adopting the...

Android in Enterprise BYOD
Enterprisesecuritymag >> cxoinsights

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

Protecting the Castle: Business' changing security landscapes
Enterprisesecuritymag >> cioviewpoint

Vincent J. Simonowicz, CIO, City of Rock Hill, SC

The challenge every business and enterprise has, is to protect their domains given the changing environments, enhanced security threats and melding of cloud services. As we are pushed to embrace the cloud services and applications, our data is...

Cloud To Enhance Physical Security as a Service
Enterprisesecuritymag >> cxoinsights

The Cloud storage has been widely embraced by businesses for storing the data and just the normal data even financial records and documents but when it comes to physical security enterprises still are reluctant to embrace cloud technology in it....

Microsoft Azure Sphere for IoT devices security
Enterprisesecuritymag >> cxoinsights

Aiming to secure edge devices, Microsoft is introducing a new Linux-based embedded OS and cloud service for microcontrollers. The solution named Azure Sphere comprises an Azure Sphere OS and certified microcontrollers alongside an Azure Sphere...

Evolving and Strengthening Organizational Security
Enterprisesecuritymag >> cioviewpoint

Sylvia Acevedo, CEO, Girl Scouts of the USA

In our ever-more data-driven world, information security is everyone’s problem-from individuals navigating the web who need to understand how to protect their personal information online, to businesses-large and small - protecting their...

The Impact of the Cloud on Information Security
Enterprisesecuritymag >> cxoinsights

Vennard Wright, Chief Information Officer, WSSC (Washington Suburban Sanitary Commission)

As a CIO for the Wash­ington Suburban Sanitary Commission (WSSC), which is a 100-year-old public wa­ter utility serving 1.8 million customers in Maryland, across 475,000 accounts, I’ve realized the challenge of balancing evolving...

Enterprises Beef Up Cybersecurity to Quash Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

Technology has reached the remotest locations in recent years. The Internet has opened new horizons and a sea of opportunities for businesses all over the world. Enterprises can now connect with their customers more effectively. A huge pipeline of...

De-Mystifying Cyber Insurance
Enterprisesecuritymag >>

Jeffrey Batt, Vice President, Marsh

De-Mystifying Cyber Insurance In our increasingly automated and digitally-reliant economy, cyber insurance is a necessary tool to mitigate the financial impact of a data breach or other damaging cyber events. Year over year, more companies are...

Face as the New Data Point: The Good, Bad and the Ugly of Facial Recognition Technologies
Enterprisesecuritymag >>

Riku Vassinen, Head of Digital Transformation, JWT Singapore

Although facial recognition technology has been around from 1960´s, it was again Apple who made this technology household name. After the launch of iPhone X, facial recognition opportunities have truly hit the mainstream. Besides locking...

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >>

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

AI and ML Influence on Cloud Security
Enterprisesecuritymag >>

Big data management is one of the difficult tasks for any organization today. For this reason, organizations prefer to utilize cloud services to manage the massive amount of data. Cloud services enable organizations to store, share and manage...

Protecting the Castle: Business' Changing Security Landscapes
Enterprisesecuritymag >>

Vincent J. Simonowicz, CIO, City of Rock Hill, SC

The challenge every business and enterprise has, is to protect their domains given the changing environments, enhanced security threats and melding of cloud services. As we are pushed to embrace the cloud services and applications, our data is...

Innovate business models with SophiaTX: a revolutionary enterprise blockchain platform pushing adoption in the ASEAN
Enterprisesecuritymag >>

KUALA LUMPUR – A successful enterprise blockchain event dubbed BUSINESS REDEFINED 2018 was held on September 25 at Suntec City, Singapore and September 27 at Connexion, Malaysia, representing the first step in building an ecosystem...

Microsoft Flaw in ADFS Opens Doors for Malicious Hackers
Enterprisesecuritymag >>

A vulnerability that allows persons with malicious intent to bypass multi-factor authentication (MFA) safeguards in Microsoft’s Active Directory Federation Services (ADFS) has been discovered. This puts organizations that where ADFS...

Blockchain Security Boost for Microsoft
Enterprisesecuritymag >>

Lately, Microsoft published two new patents which suggest that the software behemoth is planning to expand the use of its trusted execution environments (TEEs) with its blockchain offerings. According to the new filings, TEE must store a...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >>

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Need for Multi-Factor Authentication
Enterprisesecuritymag >>

A few years back, every organization had only one point of access for their data, applications and other resources—the organization’s database. However, today, from LAN, WAN, and VPN to cloud applications, every organization has...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >>

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

SophiaTX Launches Enterprise-Ready Public Blockchain
Enterprisesecuritymag >>

Switzerland – SophiaTX successfully launched its mainnet with the primary purpose of creating a public blockchain with features and capabilities suitable for enterprise use.  With its fast and secure...