An Introduction to Linux Container and Threats
Enterprisesecuritymag >> cioviewpoint

The idea of container technology first appeared around the 2000s, as a technology that allows partitioning of FreeBSD system into multiple subsystems. Then, the concept of Jails was developed as safe environments that a system admin could share...

CIOs Shouldn't See OpenStack and Public Clouds as an Either/Or Proposition
Enterprisesecuritymag >> cxoinsights

Shelton Shugar, CIO, Barclaycard [NYSE:BCS-D]

With over 20+ million lines of codes and over 30,000 people in the community, OpenStack has easily gained adoption across a variety of industries and proved its viability and reliability for production environments. It has become the fastest...

SD-WAN Adoption on the Rise in Asia Pacific But How Well Do You Understand It?
Enterprisesecuritymag >> cioviewpoint

James Forbes-May, VP, Asia-Pacific, Barracuda Networks

Businesses in Asia Pacific (APAC) are significantly increasing their investment in cloud-friendly networking technologies, according to the findings of a study of 300 APAC IT and networking professionals released by Barracuda Networks, the leader...

Business Goals for Implementing a Vulnerability Management Solution
Enterprisesecuritymag >> cxoinsights

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

Ultimately, the goal is to avoid a breach and keep our company off the news headlines. That’s a given for every CISO. But we also have business availability goals that are typically defined by service-level agreements (SLAs). "A tool...

Cloud Management Platforms that are Spearheading Innovation
Enterprisesecuritymag >> cxoinsights

Cloud management platforms are technologies utilized to operate and monitor data, services, and applications on the cloud. In determining the most efficient cloud management software, a number of features, such as flexibility, security,...

Cloud Security: The Challenges
Enterprisesecuritymag >> cioviewpoint

The soaring popularity of the cloud has resulted in steady adoption rates, which can be primarily attributed to no more hardware costs, long software release cycles, or the hassles of managing multiple physical data centers. As the benefits of...

Achieving Information Security in Healthcare
Enterprisesecuritymag >> cxoinsights

Dan Costantino, CISO, Penn Medicine

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs on a continual basis as it matures. It is critical to scrutinize whether you have...

Why our Security Problems are Getting Worse...
Enterprisesecuritymag >> csoinsight

Jeff Schwartz, VP, North America Engineering, Check Point Software Technologies

Security spending is up 8 percent year over year, yet security incidents are up ~40 percent. Why does the security “ball of yarn” continue to unravel as we pull the string. In this article, you will learn why our security problems...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >> cioviewpoint

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Machine Learning: Key to Cybersecurity
Enterprisesecuritymag >> cxoinsights

High Profile breaches such as the 2013 yahoo users account breach and the 2017 Equifax breach has highlighted the constant struggle between creating an effective security system to keep at par with the changing cyber-attack patterns. Though the...

Security Advantages of Software Defined Networking (SDN)
Enterprisesecuritymag >> cxoinsights

Dr. Edward Amoroso, Member of the Board of Directors, M&T Bank

Perhaps the defining aspect of wide-area routing over Internet infrastructure has been decentralized control. Routers are manufactured to support protocols as stand-alone entities that accept, process, and route packets independently based on...

Defense against Cyberattacks
Enterprisesecuritymag >> cxoinsights

As the cyber technology spreads its roots towards a far advanced horizon of AI, Machine Learning, and neural networking technology, security has become more of a concern in intellectual property landscape. With virus protection software disguised...

Moving toward Successful SSH Key Management for Greater Network Security
Enterprisesecuritymag >> cioviewpoint

Matthew McKenna, CSO, SSH Communications Security

When organizations realize that their poor to non-existent SSH user key management has created a significant hole in their network security, denial is often their first response. But when it comes to security, denial is dangerous. SSH user keys...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >> cioviewpoint

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

Kill the LAN!
Enterprisesecuritymag >>

Nick Roethel, Director of Technology Services (CIO), Metropolitan Transportation Commission

The LAN in the traditional sense is dying. For years, network engineers, suppliers and manufacturers have focused on multilayered, complex networks capable of routing traffic through a tapestry of complex equipment. Now, users demand simple...

Why is Hyper-converged is the new Wave
Enterprisesecuritymag >>

Michael Morey, AVP Infrastructure, National Life Group

It amazes me that the hyper-converged market did not get the attention it deserved until the last several years. Once seen as niche solution providers, the hyper-converged market players are being acquired, showing up in other solution offering...

Beyond the IoT Hype
Enterprisesecuritymag >>

Gordon Feller, Director & Consultant, Cisco Systems and Founder for Meeting of the Minds. org, Executive Advisor & Moderator for IEC (International Electrotechnical Commission)

Manufacturing plants are running at a much higher capacity utilization than ever before. Often, it is a 24-hour a day, seven days a week operation. With downtime costing plants up to US$20,000 a minute, they cannot afford disruption to their...

Five Predictions that can change the phase of cyber security in 2018
Enterprisesecuritymag >>

Cyber security is a topic that is increasingly receiving an awful lot of attention. Especially since the world we live in has companies storing their data in the cloud and depends on networking systems. Generally, when talking about the latest...

The Balancing Act: Network Security and Connectivity
Enterprisesecuritymag >>

Whitney Kellett, CIO, Aqua America [NYSE:WTR]

In today’s ever-changing digital world, utility customers expect providers to be as connected as streaming television services and email accounts. But, like a lot of industrial businesses, utilities tend not to be the earliest adopters...

Integrating Cloud Capability To Provide Reliability, Authentication, And Messaging Infrastructure
Enterprisesecuritymag >>

Kim Tracy, CIO, Northeastern Illinois University

Infrastructure To Tackle The Onslaught Of Digital Content And Mobile Devices In being a public university, we look for investments in IT infrastructure that we believe will definitely be of value. Of the key parameters I look at the future...