open source

Five Best Practices for DevOps Automation
Enterprisesecuritymag >> cioviewpoint

Open source libraries and frameworks play a crucial role in the DevOps environment that emphasizes the shorter development lifecycles, collaboration, and innovation. It’s important not to neglect the security of these open source...

An Introduction to Linux Container and Threats
Enterprisesecuritymag >> cxoinsights

The idea of container technology first appeared around the 2000s, as a technology that allows partitioning of FreeBSD system into multiple subsystems. Then, the concept of Jails was developed as safe environments that a system admin could share...

CIOs Shouldn't See OpenStack and Public Clouds as an Either/Or Proposition
Enterprisesecuritymag >> cioviewpoint

Shelton Shugar, CIO, Barclaycard [NYSE:BCS-D]

With over 20+ million lines of codes and over 30,000 people in the community, OpenStack has easily gained adoption across a variety of industries and proved its viability and reliability for production environments. It has become the fastest...

Active Countermeasures Unveils New Versions of Rita and AI-Hunter
Enterprisesecuritymag >> cxoinsights

Chris Brenton, COO

One of the significant limitations of many security attestations is that they do not verify if a network being evaluated contains compromised systems. Today's security tools are incapable of distinguishing between normal network traffic and...

Securing Your Industrial Control Systems Today
Enterprisesecuritymag >> cxoinsights

Richard Bussiere, Director, Product Management APAC, Tenable

In March 2018, the US-CERT published an alert that a multi-stage campaign against critical infrastructures was being conducted by Russia against targets in the United States. This alert was the result of detailed analysis of the attacks...

The Digital Transformation Trifecta: Cloud, IoT, and Big Data
Enterprisesecuritymag >> cxoinsights

Joe Topinka, CIO, SnapAV

Staying relevant is proving difficult for many companies as the digital transformation tsunami hits the shores of most businesses. Balancing between the hype and realities of the cloud, IoT, and big data is confusing for C-suite executives....

SophiaTX Launches Enterprise-Ready Public Blockchain
Enterprisesecuritymag >> cxoinsights

Switzerland – SophiaTX successfully launched its mainnet with the primary purpose of creating a public blockchain with features and capabilities suitable for enterprise use.  With its fast and secure...

The New Rise of Time Series Databases
Enterprisesecuritymag >> cioviewpoint

Michael Risse, VP, Seeq Corporation

Time series data storage and management has long been an interesting but quiet market category. It’s been a multibillion-dollar business for years and a main stay in process manufacturing plants since the 1980s. But recently, the category...

5 Challenges Facing Start-Ups in 2018
Enterprisesecuritymag >> cxoinsights

Ronen Nir, General Partner at Viola Ventures

We’ve seen the lists of the biggest successes of 2017 and the best opportunities for 2018, but what publications tend to leave out is the equally important view of the biggest challenges. As any startup CEO or entrepreneur in the tech space...

The Cloud- First Approach
Enterprisesecuritymag >> cxoinsights

Arjun Chopra, Partner, Floodgate

Could you give me an overview of the types of opportunities you pursue as a Partner at Floodgate? I believe that the public cloud represents a generational platform shift that has delivered not only the fastest growing enterprise software...

Implementing a RESTful API testing program
Enterprisesecuritymag >> cxoinsights

RESTful API testing ensures a culture of continuous testing and team accountability within an organization. Although the standard tests for web applications initially were dominated heavily by front-end graphical user interface testing, today it...

Thinking outside the Firewall: Evolution at a Glance
Enterprisesecuritymag >> cxoinsights

Johan Hybinette, CISO, Vonage

In the quest to gain a competitive advantage, businesses today are focused on leveraging the information inside their own data warehouses. However, is it illogical to focus exclusively on the security of the data inside the firewall? Sure enough,...

Consolidation of GSA IT
Enterprisesecuritymag >> csoinsight

David Shive, CIO, GSA

David Shive, CIO, GSA On July 30 of this year I was honored to be named the Chief Information Officer (CIO) of the United States General Services Administration (GSA). The role of CIO here at GSA comes with a legacy of innovation, early...

Establishing Best Practices for a Comprehensive Risk-based Product Security Program
Enterprisesecuritymag >> csoinsight

Michael McNeil, Global Product Security & Services Officer, Philips

One of the more critical challenges facing medical device manufacturers and their customers today is to ensure that all products and solutions can withstand cyber attacks. The protection of customer networks and private patient health data is of...

Adapting to the Ever-changing Threat Landscape
Enterprisesecuritymag >> cxoinsights

Brian Hussey, Global Director of SpiderLabs Incident Response & Readiness, Trustwave

Every security professional remembers the day they realized their job is not simply applying patches or plugging in a new security technology, but instead is a daily battle of wit with resilient, creative and adaptable adversaries. My moment...

Overcoming Security Challenges Associated with Big Data
Enterprisesecuritymag >>

John Armstrong, CMO, Zettaset Inc

The amount of digital data in the universe is growing at an exponential rate, doubling in size every two years. By 2020 the digital universe, the data we create and replicate annually, is estimated to reach 44 zeta bytes, or 44 trillion gigabytes....

Emerging Tech Challenges in Legal: Data Insecurity as an Unfair Business Practice
Enterprisesecuritymag >>

Lisa LaForge, Director-Technology Transactions & Chairperson of the Open Source Steering Committee,

CIOs should be aware of a recent Third Circuit appellate decision which affirms the Federal Trade Commission’s (FTC) authority to prosecute enterprises which fail to adopt reasonable data security measures. While many states have laws about...

Scaling Your Application Security Program
Enterprisesecuritymag >>

Chris Wysopal, Co-Founder, CTO & CISO, Veracode

We now live in a world where software applications are omnipresent. The world’s largest enterprises are increasingly finding themselves in the software business. It doesn’t matter what their end products are, they are building Web...

Countering Cyber Vulnerabilities & Threats
Enterprisesecuritymag >>

Roota Almeida, CISO, Delta Dental of New Jersey

Cyber Insurance and the Threat Landscape In the recent years, the threat landscape has significantly changed and will continue to do so. In the near future, healthcare and health insurance industry will continue to be a prime target for...

Big Data Analysis and Thought Diversity: Lessons From Anscombe's Quartet
Enterprisesecuritymag >>

Aaron Ferguson, Technical Director-Cyber & Information Analytics Office, National Security Agency

According to Gartner Incorporated, the world's leading information technology research and advisory company, Big Data is defined as “high volume, high-velocity and high-variety information assets that demand cost-effective, innovative...