enterprisesecuritymag

networks

CDNs for Satiating Online Video Demand
Enterprisesecuritymag >> cxoinsights

The increasing dominance of the Internet and the demand for mobility have raised the user expectations to an unprecedented level. Content users expect not only engaging and relevant content but also delivery at the lightening speed. As the video...

SD-WAN Adoption on the Rise in Asia Pacific But How Well Do You Understand It?
Enterprisesecuritymag >> cxoinsights

James Forbes-May, VP, Asia-Pacific, Barracuda Networks

Businesses in Asia Pacific (APAC) are significantly increasing their investment in cloud-friendly networking technologies, according to the findings of a study of 300 APAC IT and networking professionals released by Barracuda Networks, the leader...

Evolving and Strengthening Organizational Security
Enterprisesecuritymag >> cioviewpoint

Sylvia Acevedo, CEO, Girl Scouts of the USA

In our ever-more data-driven world, information security is everyone’s problem-from individuals navigating the web who need to understand how to protect their personal information online, to businesses-large and small - protecting their...

The Importance of Conforming to HIPAA for Healthcare Entities
Enterprisesecuritymag >> cxoinsights

Randall Frietzsche, CISO, Denver Health

If you are a US-based healthcare entity, and you electronically bill for your services, you probably fall under HIPAA regulations. HIPAA requires encryption to protect patient data. This article will discuss the key points of this requirement....

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cxoinsights

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Artificial Intelligence Explained.... with Cats and Dogs...
Enterprisesecuritymag >> cxoinsights

Richard Bradley, Director, Digital Supply Networks, Deloitte

Artificial Intelligence is, at its heart, the discipline of building machines that think like humans-in particular the development and display of learning and problem solving capabilities. There are hundreds of articles out there that...

The Darkening World of DDoS
Enterprisesecuritymag >> csoinsight

Matt Mahvi, CEO, Staminus Communications

Imagine a new financial technology company with media coverage and solid traction. The CTO has built amazing engineering and operations teams that have learned to scale the company infrastructure with the company’s viral growth. Clients are...

Why DDoS Makes for Risky Business
Enterprisesecuritymag >> csoinsight

Sam Curry, CSO & CTO, Arbor Networks

Defending organizations’ networks against DDoS attacks has long been a daunting challenge—but now cybercriminals are making it even more so; headlines today are rife with news of another DDoS attack, data breach or other security...

Denial of Service Attacks: From Bandwidth to APIs
Enterprisesecuritymag >> cxoinsights

Edward G. Amoroso, SVP & CSO, AT&T

In the months leading up to the Millennium change, the Clinton White House was developing a comprehensive fusion center in Washington, DC to monitor the Y2K transition status of IT systems around the world. The idea was that domestic and...

Why Offensive Countermeasures Weaken Our Cybersecurity
Enterprisesecuritymag >> csoinsight

Nuala O’Connor, President & CEO, Center for Democracy & Technology

For many fortunate Americans, cyber attacks and malicious hacking lives only in the headlines. When salacious details from private email conversations at a movie studio are posted online, we might snicker and wonder how someone could be so...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> cxoinsights

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

What RSA 2015 can Tell CIOs about the Evolution of Security
Enterprisesecuritymag >> cxoinsights

Robert Clyde, CISM, International VP, ISACA

Have you ever noticed that it’s easier to spot changes when you only see some­one or something occa­sionally compared to when you see that same thing every day? For example, were you ever able to easily tell that an...

Why Offensive Countermeasures Weaken Our Cybersecurity
Enterprisesecuritymag >> csoinsight

Nuala O’Connor, President & CEO, Center for Democracy & Technology

For many fortunate Americans, cyber attacks and malicious hacking lives only in the headlines. When salacious details from private email conversations at a movie studio are posted online, we might snicker and wonder how someone could be so...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> vendor

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

Nozomi Networks: The Secure Partnership for OT
Enterprisesecuritymag >> vendor

Andrea Carcano, Co-founder and Chief Product Officer

Real-time cybersecurity and visibility solutions for industrial control systems

Dispatch Labs: Enabling the Decentralization of Data-driven Applications
Enterprisesecuritymag >> vendor

Zane Witherspoon, Co-founder & CTO

Dispatch Labs is a blockchain solution company that has built an advanced Dapp platform which can facilitate and compile any quantity of data. The company provides tools for enterprises and entrepreneurs to formulate business solutions built for...

Global IP Networks: Building a Secure, Dependable Business Environment
Enterprisesecuritymag >> vendor

Reyner Natahamidjaja, CEO

Global IP Network provides managed security services and enterprise data center facilities. It delivers end-to-end service, technical expertise, and service consistency by leveraging advanced IT support capabilities. By offering resources like...

Global IP Networks: Building a Secure, Dependable Business Environment
Enterprisesecuritymag >> vendor

Reyner Natahamidjaja, CEO

Global IP Network provides managed security services and enterprise data center facilities. It delivers end-to-end service, technical expertise, and service consistency by leveraging advanced IT support capabilities. By offering resources like...

Accend Networks: Securing Businesses
Enterprisesecuritymag >> vendor

Paula Wong, CEO

Accend Networks is one of the leading vulnerability management solution providers offering small, medium-sized, and large enterprises, including SLED clients, consulting services. It has a focus on network security, network design, implementation...

Tufin: Toward Firewall Optimization
Enterprisesecuritymag >>

Ruvi Kitov, CEO & Co-Founder

Provides security policy orchestration solutions to enterprises that can streamline the management of security policies across complex and heterogeneous networks