enterprisesecuritymag

mobile

BYOD: How to Safeguard Your Company's Data with Policies and Procedures That Address Visual Security Threats
Enterprisesecuritymag >> cxoinsights

Rebecca Herold, President of SIMBUS LLC, CEO of the Privacy Professor and 3M Privacy Consultant

The devices used for personal and work-related tasks are completely intertwined today, as employees often prefer the simplicity and flexibility of using what they already own, and businesses view this as a way to obtain increased productivity from...

BYOD: How to Safeguard Your Company's Data with Policies and Procedures That Address Visual Security Threats
Enterprisesecuritymag >> cxoinsights

Rebecca Herold, President of SIMBUS LLC, CEO of the Privacy Professor and 3M Privacy Consultant

The devices used for personal and work-related tasks are completely intertwined today, as employees often prefer the simplicity and flexibility of using what they already own, and businesses view this as a way to obtain increased productivity from...

Implications of RTA for Contact Centers
Enterprisesecuritymag >> cxoinsights

The dynamic changes in business requirements have raised security concerns for enterprises across all industries. Contact centers are also vulnerable to security threats as most of the fraud incidents have at least one touch point with a contact...

The Future of Encryption in the Media and Broadcasting Industry
Enterprisesecuritymag >> cxoinsights

Stephen Fridakis, Vice President, Media & Tech Ops, HBO

Broadcasters are using encryption to transmit programming to subscribers in a way that only those authorized can decrypt and view it. There are several applications for this kind of technology including secure distribution of copyrighted media...

Multifactor Authentication Solutions and Their Classifications
Enterprisesecuritymag >> cxoinsights

FREMONT, CA: Multifactor authentication or MFA were designed to keep users' credentials protected but all MFA methods don’t provide 100 percent security and have their own strengths and weaknesses. MFA methods safeguard and simplify...

The Risk of Using Biometrics to Secure Mobile Payments
Enterprisesecuritymag >> cxoinsights

Biometrics is an evolving technology that has found excellent use in privileging access and identity authentication. This security technology has become an intrinsic part of a range of sectors, ranging from government and military organizations to...

The Challenges of Online Payments
Enterprisesecuritymag >> cxoinsights

As technology advances in smartphones and e-wallets; purchase patterns change, and demand for cross-border multi-currency electronic payments increase, providers are under pressure to provide peer-to-peer payments beyond traditional banking...

Information Security Means Never Being Done
Enterprisesecuritymag >> cioviewpoint

Dan Callahan, VP, Cloud Services, CGNET

Do you recall the story of Sisyphus? He was the Greek god whose punishment for a life of indiscretions was to roll a boulder to the top of a hill—and then watch as it rolled to the bottom. Managers in charge of information security can...

Information Security Means Never Being Done
Enterprisesecuritymag >> cioviewpoint

Dan Callahan, VP, Cloud Services, CGNET

Do you recall the story of Sisyphus? He was the Greek god whose punishment for a life of indiscretions was to roll a boulder to the top of a hill—and then watch as it rolled to the bottom. Managers in charge of information security can...

Manufacturing Inequality
Enterprisesecuritymag >> cioviewpoint

Oliver Perez, Ph.D, Director, Manufacturing Process Technology, BD

How do you make an economy and one of its most important drivers i.e. manufacturing, work for everybody in this globalized technological world when the transformation of raw materials into useful, appealing finish goods is constantly reinvented...

Cybersecurity Strategy - Do You Have One Yet?
Enterprisesecuritymag >> cioviewpoint

Dina Moskowitz, CEO and Founder, SaaSMAX Corp

Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats,...

The Next Phase of Video Surveillance
Enterprisesecuritymag >> cioviewpoint

A video surveillance system has become an inevitable part of most businesses today to keep an eye on the events and happening in the workplace. Many business owners today need the convenience and ease of viewing live video even while they are away...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> cxoinsights

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> cxoinsights

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

The Balancing Act: Network Security and Connectivity
Enterprisesecuritymag >> cxoinsights

Whitney Kellett, CIO, Aqua America [NYSE:WTR]

In today’s ever-changing digital world, utility customers expect providers to be as connected as streaming television services and email accounts. But, like a lot of industrial businesses, utilities tend not to be the earliest adopters...

Integrating Cloud Capability To Provide Reliability, Authentication, And Messaging Infrastructure
Enterprisesecuritymag >>

Kim Tracy, CIO, Northeastern Illinois University

Infrastructure To Tackle The Onslaught Of Digital Content And Mobile Devices In being a public university, we look for investments in IT infrastructure that we believe will definitely be of value. Of the key parameters I look at the future...

Pushing the Needle of Innovation in Banking
Enterprisesecuritymag >>

Jojo Seva, CIO, NEFCU

Technology and NEFCU NEFCU is in a transformational phase where we intend to leverage existing and emerging technologies to be more strategic. For me, the essence of strategy is to create competitive advantage. Simply having a technology...

Five Enterprise IT Security Stats That May Surprise You
Enterprisesecuritymag >>

Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

Every day, Kaspersky Lab talks to IT managers and C-level executives about the state of their business security. Our conversations have a lot of the same recurring security themes, but just like the businesses themselves, no two stories are ever...

Transforming Your Business through Secure Mobile Strategies
Enterprisesecuritymag >>

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung All too often, I see organi­zations that are looking to improve their mo­bile strategies fall into the same patterns and quicksand in these efforts....

Role of the Modern CISO Matures
Enterprisesecuritymag >>

Gary Hayslip, Deputy Director, CISO, City of San Diego

Ten years ago, as a network architect managing my organization’s network teams, I was surprised one day when my organization’s CIO walked in and said “You are our new Information Security Officer in charge of both network and...