enterprisesecuritymag

networking

Combating Organizational Financial Risks
Enterprisesecuritymag >> cxoinsights

Cris Luce, CMO/CTO, Accuro AgriServices

The modern world is defined, in large part, by electronic communication and the massive storage and exchange of digital information. While the Internet and other systems allow companies to operate on a global basis and enable geographically...

Enhancing Banking Performance through Technology Updation
Enterprisesecuritymag >> cioviewpoint

Gary Kern, CIO, MutualBank

  Banking scenario has been travelling through tremendous technological changes over teh years and teh companies are becoming more equipped to provide banking and customer services at an...

Delivery and Adoption of Cloud Computing
Enterprisesecuritymag >> cxoinsights

Michael Stoeckert, CTO, ProAssurance

What is “Cloud” ? Cloud computing delivery models provide users with on-demand access to a flexible, wide-ranging pool of technology assets composed of services, applications, servers, networks, and storage facilities. Due to the...

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services....

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services....

Leading IT through Collaboration
Enterprisesecuritymag >> cioviewpoint

Brenda Decker, CIO, State of Nebraska

Brenda Decker, CIO, State of Nebraska Each and every day the Chief Information Officer of any organization is presented with new opportunities to use technology to provide services to constituents. State Government CIO’s are no...

Getting Moore Out of Your Cloud
Enterprisesecuritymag >> cxoinsights

Doug Sandy, Chief Architect, Hyperscale & Cloud Solutions, Artesyn Embedded Technologies

As many of you in the technology industry are aware, in 1965, Dr. Gordon Moore, Co-founder of Intel, observed that the number of transistors producible within a silicon wafer could economically double every year. Although the doubling rate has...

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services. However, a DDoS attack can disrupt the operation of even the most powerful...

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services. However, a DDoS attack can disrupt the operation of even the most powerful...

DDoS: Are You Prepared?
Enterprisesecuritymag >> csoinsight

Robb Reck, CISO, Ping Identity and Sam Masiello, VP and CISO, Teletech

Distributed Denial of Service (DDoS) attacks are at an all-time high and companies across every vertical are feeling the pain. The internet has been weaponized and is being used to disable and disrupt the services and products being delivered...

Preventing Cyber-Attacks in Universities with Operational Collaboration
Enterprisesecuritymag >> csoinsight

Michael Corn, Deputy CIO & CISO, Brandeis University

University networks have long been viewed as poor models for information security. However in practice many of the challenges facing these networks (broad adoption of consumer-grade services and BYOD for example) are increasingly challenging...

Gearing up To Protect against Security Breaches
Enterprisesecuritymag >> cioviewpoint

Paul Leury, CIO, & David Mason, Director, The Boon Group

Needless to say, for CIOs, security has always been on our radar. But it seems like members of our executive teams are just now joining us in our concern. In response to the increased frequency, impact, and media spectacle of security breaches,...

Is Outsourcing a Security Operations Center a Good Idea?
Enterprisesecuritymag >> csoinsight

Fred Newberry, CISO, BDP International

Threats have become so significant and sophisticated in recent years, that technology and human resources are struggling to keep up, much less get ahead of them. Gone are the days when anti-virus and a strongly configured firewall could keep out...

Macro Changes in the IT Security Industry
Enterprisesecuritymag >> cxoinsights

Richard Stiennon, Chief Research Analyst, IT-Harvest

On all technology fields, security is the only one that is almost completely driven by outside actors. Changes in ERP,CRM, storage, wireless, and computers are driven by competitive pressures, innovation, and the drive to make things smaller,...

Cloud Security Grows Up
Enterprisesecuritymag >> cioviewpoint

Kevin Winter, VP & CIO and Brian Javonillo, Senior Associate, Booz Allen Hamilton

Many companies today have established minimum levels of security requirements for their IT environments. CIOs are realizing, though, that those security models don’t translate when IT capabilities move to the Cloud. "Compliance...

Clear Focus Areas Required For Information Security
Enterprisesecuritymag >> cxoinsights

Jan Billiet, Director IS Security & Risk Management, Philip Morris International

"May you live in interesting times!" Today’s information security profession appears overburdened with the challenges brought by cloud computing, personal data protection,social networking, advanced persistent threats and all other...

Clear Focus Areas Required For Information Security
Enterprisesecuritymag >> cxoinsights

Jan Billiet, Director IS Security & Risk Management, Philip Morris International

"May you live in interesting times!" Today’s information security profession appears overburdened with the challenges brought by cloud computing, personal data protection,social networking, advanced persistent threats and all other...

Security of Cloud Computing
Enterprisesecuritymag >> cxoinsights

Anthony Scarola, CISSP, Director of Technical Information Security, TowneBank

Ugh, “cloud”. The term and how it has been applied to hosted computing services is disappointing. Hosting providers have repurposed the cloud placeholder— typically used by network engineers to depict complex, yet understood...

When is a Firewall not a Firewall?: Insecurity in the Technology Product Supply Chain
Enterprisesecuritymag >> cxoinsights

John Linkous, Founder & CEO, InterPoint Group

I would like you to stop reading this article, just for a moment, and take a brief glimpse at your mobile phone. No doubt, there is a major vendor name on the outside of the case: Apple, Samsung, LG, or another trusted global technology...

Cloud Adoption Rate Hike Spurs Demand for Security Professionals
Enterprisesecuritymag >> cxoinsights

Julie Peeler, Foundation Director, (ISC)²

For many organizations, cloud adoption is no longer a question of if, but how much. Several factors are contributing to rapid growth and change in the cloud computing market. The cloud provides multiple business and consumer benefits, many of...