enterprisesecuritymag

microsoft

Time to Think Differently
Enterprisesecuritymag >> cxoinsights

Joseph DiBiase, Director Global Information Security, Interface

As with many of my CISO colleagues, our businesses have been moving (sometimes slowly and sometimes very quickly) to the cloud. We see constant introduction of new SaaS applications and utilization of PaaS and IaaS services from Amazon,...

Rethinking E-mail Security
Enterprisesecuritymag >> cxoinsights

Karthik Devarajan, Director of IT, Maryland Legal Aid

E-mail is still the top choice for workplace communication in both big and small organizations, with an average office worker sending and receiving 121 e-mails per day (Smith, 2018). Therefore, it is not a surprise that e-mail remains the most...

The New Rise of Time Series Databases
Enterprisesecuritymag >> cxoinsights

Michael Risse, VP, Seeq Corporation

Time series data storage and management has long been an interesting but quiet market category. It’s been a multibillion-dollar business for years and a main stay in process manufacturing plants since the 1980s. But recently, the category...

Talking about Thinking Machines
Enterprisesecuritymag >> cxoinsights

Dave Schubmehl, Research Director, IDC

As the market for intelligent applications and the software platforms used to build them has emerged over the last few years, there has been a lot of nomenclature confusion. What should we call these applications and what should we call the...

Blockchain for the Enterprise
Enterprisesecuritymag >> cioviewpoint

Aaron Gette, CIO, The Bay Club Company

Most organizations have not implemented blockchain, but few are venturing into the development stage of projects and decentralized applications. There’s immeasurable hype and promise, backed by an intense amount of research and investment...

Eliminating Passwords: The Journey
Enterprisesecuritymag >> cioviewpoint

Bret Arsenault, CVP & CISO, Microsoft

According to one estimate, the average person has 27 online accounts with user names and passwords. Choosing the right password is as confusing as trying to remember dozens of passwords—it should be complex, more than 8 characters long, it...

The Industrial IoT Attack Surface
Enterprisesecuritymag >> cioviewpoint

Matt Griffiths, Vice President, Data-Driven Transformation, Stanley Black & Decker, Inc.

Across the Industrial Manufacturing sector, the average plant and equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...

The Cloud- First Approach
Enterprisesecuritymag >> cxoinsights

Arjun Chopra, Partner, Floodgate

Could you give me an overview of the types of opportunities you pursue as a Partner at Floodgate? I believe that the public cloud represents a generational platform shift that has delivered not only the fastest growing enterprise software...

AI is the New UI-AI + UX + DesignOps
Enterprisesecuritymag >> cxoinsights

Amit Bahree, Executive, Global Technology and Innovation, Avanade

Today you cannot read any technology or business article without some discussion around Artificial Intelligence (AI), whether explicit or implicit. We see AI integrating deeper in all elements of our life–be it at home with our families, or...

IoT: Disrupting B2B and B2C Enterprise Landscape
Enterprisesecuritymag >> cioviewpoint

Internet of Things (IoT) has been one of the most booming topic and center of discussion in technology sphere for more than a decade. It not only powers technological devices but also has a great impact at an individual level, socially and...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >> cioviewpoint

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

Vulnerable times
Enterprisesecuritymag >> cxoinsights

Technology is continuously getting integrated into every aspect of our lives and the dependency is rising with every passing day. At the same time, the risk involved in case of technological failure is quite high. In the past quarter of the...

Technology Challenges in the Days of Hyper Competition, Personalization, and Super Hacking
Enterprisesecuritymag >> cxoinsights

Gustaaf Schrils, Sr VP & CIO, White Lodging Services

After 20-plusyears at InterContinental Hotel Group, where I finished as vice president of global service management, I have been fortunate to transition from the hotel brand side of the hospitality industry to the hotel ownership and management...

Surging Need to Strengthen Data Security
Enterprisesecuritymag >> cxoinsights

Sam Masiello, Chief Information Security Officer, TeleTech

The threat landscape continues to evolve on seemingly a minute-by-minute basis. With cyber criminals looking to breach organizations both from the outside-in and from the inside-out, both companies and their employees need to continue raising...

Essential Add-ons for Fast Paced Cyber Threatscape: Enterprise Vulnerability and Threat Management
Enterprisesecuritymag >> cxoinsights

Girish Chiruvolu, Director Information Security and Risk management, Thomson Reuters

In the age of all-pervasive cyber threats, enterprises with limited resources are stuck with the challenge of taking huge risks and finding right resources/ strategies around a formal risk management program. Ashley-Madison's exit from the...

Think Fighting Email Fraud is Someone Else's Job? Here's the Real Cost of Doing Nothing
Enterprisesecuritymag >> cxoinsights

Dennis Dayman, Chief Privacy and Security Officer at Return Path

Cyberattacks against your brand can be very damaging and costly to both your revenue and your reputation. Cyberattacks are more than someone breaking into your databases or systems and stealing data; instead, this term refers to fraud and the...

Think Fighting Email Fraud is Someone Else's Job? Here's the Real Cost of Doing Nothing
Enterprisesecuritymag >> cxoinsights

Dennis Dayman, Chief Privacy and Security Officer at Return Path

Cyberattacks against your brand can be very damaging and costly to both your revenue and your reputation. Cyberattacks are more than someone breaking into your databases or systems and stealing data; instead, this term refers to fraud and the...

Sensitive Data Protection Processes-A Key to IT Security
Enterprisesecuritymag >> cxoinsights

Randy Marchany, CISO, Virginia Tech IT Security Office

One of the common mistakes organizations make is to focus on the technologies rather than protecting the organization’s sensitive data. Certainly, protecting devices is a necessary task but it’s the data that counts. There are no...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >>

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >>

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...