enterprisesecuritymag

network

Payment Security Alliance: Improved Payment Security
Enterprisesecuritymag >> cxoinsights

In the U.S., most of the payments are done through credit cards that expose the vulnerability in payment security. This vulnerability in payment security translates into credit card fraud. Businesses can prevent fraudulent transactions if they...

Secure Payments Partnership: Payment Security Alliance with Biometrics and AI
Enterprisesecuritymag >> cxoinsights

Biometrics is gaining constant popularity as an authentication tool in numerous industries and contexts, including the financial services sector. Technology developments—especially, enhanced accuracy and lower costs of biometric solutions,...

Dealing with Network Security Threats the Right Way
Enterprisesecuritymag >> cioviewpoint

In today’s expanding IT environment, collecting network usage data and deploying firewalls to monitor a network is hardly a standard procedure. Relying solely on endpoint monitoring can put insights on the network traffic and the overall...

Why our Security Problems Are Getting Worse...
Enterprisesecuritymag >> cxoinsights

Jeff Schwartz, VP, North America Engineering, Check Point Software Technologies

Security spending is up 8 percent year over year, yet security incidents are up ~40 percent. Why does the security “ball of yarn” continue to unravel as we pull the string. In this article, you will learn why our security problems...

Artificial Intelligence Explained.... with Cats and Dogs...
Enterprisesecuritymag >> cxoinsights

Richard Bradley, Director, Digital Supply Networks, Deloitte

Artificial Intelligence is, at its heart, the discipline of building machines that think like humans-in particular the development and display of learning and problem solving capabilities. There are hundreds of articles out there that...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >> cxoinsights

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Network analytics tools deepen with machine learning and AI
Enterprisesecuritymag >> cxoinsights

Network analytics has been changing the overall businesses performance for quite some time. More companies are mastering the use of comprehensive analytics strategy to increase efficiency, gain a more significant competitive advantage, and boost...

Keys to Building a Winning Startup Team
Enterprisesecuritymag >> csoinsight

Patrick Henry, Founder & CEO: Strategic Advisory and Executive Coaching, QuestFusion

If you’re building a company -- not just a sole proprietorship -- you need a solid team. You want the people who surround you to be the best in their field. How do you identify those people? How do you attract them to your company? Once you...

Machine Learning: Key to Cybersecurity
Enterprisesecuritymag >> csoinsight

High Profile breaches such as the 2013 yahoo users account breach and the 2017 Equifax breach has highlighted the constant struggle between creating an effective security system to keep at par with the changing cyber-attack patterns. Though the...

Security Advantages of Software Defined Networking (SDN)
Enterprisesecuritymag >> csoinsight

Dr. Edward Amoroso, Member of the Board of Directors, M&T Bank

Perhaps the defining aspect of wide-area routing over Internet infrastructure has been decentralized control. Routers are manufactured to support protocols as stand-alone entities that accept, process, and route packets independently based on...

Security Advantages of Software Defined Networking (SDN)
Enterprisesecuritymag >> cioviewpoint

Dr. Edward Amoroso, Member of the Board of Directors, M&T Bank

Perhaps the defining aspect of wide-area routing over Internet infrastructure has been decentralized control. Routers are manufactured to support protocols as stand-alone entities that accept, process, and route packets independently based on...

Cybersecurity Strategy - Do You Have One Yet?
Enterprisesecuritymag >> cioviewpoint

Dina Moskowitz, CEO and Founder, SaaSMAX Corp

Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats,...

Defense against Cyberattacks
Enterprisesecuritymag >> cioviewpoint

As the cyber technology spreads its roots towards a far advanced horizon of AI, Machine Learning, and neural networking technology, security has become more of a concern in intellectual property landscape. With virus protection software disguised...

Moving toward Successful SSH Key Management for Greater Network Security
Enterprisesecuritymag >> cxoinsights

Matthew McKenna, CSO, SSH Communications Security

When organizations realize that their poor to non-existent SSH user key management has created a significant hole in their network security, denial is often their first response. But when it comes to security, denial is dangerous. SSH user keys...

Moving toward Successful SSH Key Management for Greater Network Security
Enterprisesecuritymag >>

Matthew McKenna, CSO, SSH Communications Security

When organizations realize that their poor to non-existent SSH user key management has created a significant hole in their network security, denial is often their first response. But when it comes to security, denial is dangerous. SSH user keys...

Moving toward Successful SSH Key Management for Greater Network Security
Enterprisesecuritymag >>

Matthew McKenna, CSO, SSH Communications Security

When organizations realize that their poor to non-existent SSH user key management has created a significant hole in their network security, denial is often their first response. But when it comes to security, denial is dangerous. SSH user keys...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >>

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >>

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >>

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

Kill the LAN!
Enterprisesecuritymag >>

Nick Roethel, Director of Technology Services (CIO), Metropolitan Transportation Commission

The LAN in the traditional sense is dying. For years, network engineers, suppliers and manufacturers have focused on multilayered, complex networks capable of routing traffic through a tapestry of complex equipment. Now, users demand simple...