enterprisesecuritymag

network

Cybersecurity - Its Significance in the Business
Enterprisesecuritymag >> cioviewpoint

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack–struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity solutions....

DevOps Automation: the key to Managing Machine Identities
Enterprisesecuritymag >> cioviewpoint

Manual managing machine identities can lead to some specific cybersecurity problems. DevOps is perceived to be agile, and it defeats the purpose of agility when the work is manual. The time spent on manual management of machine identities can...

CDNs for Satiating Online Video Demand
Enterprisesecuritymag >> cxoinsights

The increasing dominance of the Internet and the demand for mobility have raised the user expectations to an unprecedented level. Content users expect not only engaging and relevant content but also delivery at the lightening speed. As the video...

An Introduction to Linux Container and Threats
Enterprisesecuritymag >> cxoinsights

The idea of container technology first appeared around the 2000s, as a technology that allows partitioning of FreeBSD system into multiple subsystems. Then, the concept of Jails was developed as safe environments that a system admin could share...

CIOs Shouldn't See OpenStack and Public Clouds as an Either/Or Proposition
Enterprisesecuritymag >> cxoinsights

Shelton Shugar, CIO, Barclaycard [NYSE:BCS-D]

With over 20+ million lines of codes and over 30,000 people in the community, OpenStack has easily gained adoption across a variety of industries and proved its viability and reliability for production environments. It has become the fastest...

The Race against Cybercrime: Five Fundamental Strategies to Get you to the Finish Line
Enterprisesecuritymag >> cxoinsights

Destiny Bertucci, Head Geek™, SolarWinds

Singapore has seen tremendous progress in transforming its landscape and integrating with modern technology. The understanding that digital transformation is vital to growth—not to mention convenience and added efficiencies—is deeply...

SD-WAN Adoption on the Rise in Asia Pacific But How Well Do You Understand It?
Enterprisesecuritymag >> cxoinsights

James Forbes-May, VP, Asia-Pacific, Barracuda Networks

Businesses in Asia Pacific (APAC) are significantly increasing their investment in cloud-friendly networking technologies, according to the findings of a study of 300 APAC IT and networking professionals released by Barracuda Networks, the leader...

SD-WAN Adoption on the Rise in Asia Pacific But How Well Do You Understand It?
Enterprisesecuritymag >> cioviewpoint

James Forbes-May, VP, Asia-Pacific, Barracuda Networks

Businesses in Asia Pacific (APAC) are significantly increasing their investment in cloud-friendly networking technologies, according to the findings of a study of 300 APAC IT and networking professionals released by Barracuda Networks, the leader...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

Evolving and Strengthening Organizational Security
Enterprisesecuritymag >> cioviewpoint

Sylvia Acevedo, CEO, Girl Scouts of the USA

In our ever-more data-driven world, information security is everyone’s problem-from individuals navigating the web who need to understand how to protect their personal information online, to businesses-large and small - protecting their...

The Importance of Conforming to HIPAA for Healthcare Entities
Enterprisesecuritymag >> cioviewpoint

Randall Frietzsche, CISO, Denver Health

If you are a US-based healthcare entity, and you electronically bill for your services, you probably fall under HIPAA regulations. HIPAA requires encryption to protect patient data. This article will discuss the key points of this requirement....

Tactical Decisions in Fighting Cyberattacks must be based on a Security Framework
Enterprisesecuritymag >> cxoinsights

Mike Benjamin, Senior Director of Threat Intelligence, CenturyLink

Security 101: Know Thyself Anyone looking for a sign to show the cybersecurity tide is turning, that the industry is starting to gain back the upper hand from cybercriminals, is going to have to wait abit longer. In the first few months of...

Cybersecurity-Its Significance in the Business
Enterprisesecuritymag >> cxoinsights

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack– struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity...

Points to Consider Before Choosing a Managed Security Service Provider (MSSP)
Enterprisesecuritymag >>

Associating with a Managed Security Service Provider (MSSP) is essential given the frequency and the severity of cyber attacks. Organizations cannot keep up with the sophistication, diversity, and scale on their own. Partnering with an MSSP is...

Business Goals for Implementing a Vulnerability Management Solution
Enterprisesecuritymag >>

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

Ultimately, the goal is to avoid a breach and keep our company off the news headlines. That’s a given for every CISO. But we also have business availability goals that are typically defined by service-level agreements (SLAs). "A tool...

Cloud Management Platforms that are Spearheading Innovation
Enterprisesecuritymag >>

Cloud management platforms are technologies utilized to operate and monitor data, services, and applications on the cloud. In determining the most efficient cloud management software, a number of features, such as flexibility, security,...

Cloud Security: The Challenges
Enterprisesecuritymag >>

The soaring popularity of the cloud has resulted in steady adoption rates, which can be primarily attributed to no more hardware costs, long software release cycles, or the hassles of managing multiple physical data centers. As the benefits of...

Achieving Information Security in Healthcare
Enterprisesecuritymag >>

Dan Costantino, CISO, Penn Medicine

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs on a continual basis as it matures. It is critical to scrutinize whether you have...

SMBs Underequipped to Deal with Cyber Attacks
Enterprisesecuritymag >>

According to the 2018 SMB IT Security Report by Untangle, Small or Medium-Sized Businesses (SMBs) are equally, if not more, susceptible to cybersecurity attacks as any large enterprise. Untangle surveyed 350 SMBs and compiled data on IT trends as...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >>

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...