enterprisesecuritymag

operating system

Android in Enterprise BYOD
Enterprisesecuritymag >> cioviewpoint

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cxoinsights

Vennard Wright, CIO, WSSC

As consumers and recipients of services from utilities, our least favorite thing about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Active Countermeasures Unveils New Versions of Rita and AI-Hunter
Enterprisesecuritymag >> cioviewpoint

Chris Brenton, COO

One of the significant limitations of many security attestations is that they do not verify if a network being evaluated contains compromised systems. Today's security tools are incapable of distinguishing between normal network traffic and...

Amazon Comes Up With A New OS
Enterprisesecuritymag >> cxoinsights

Amazon announced a couple of new features and products on the IoT technology. They have come up with a new operating system for IoT devices and have named it to be Amazon FreeRTOS. This operating system is designed for devices which has only MCU...

The Need for Identity & Access Management
Enterprisesecuritymag >> cxoinsights

Gehan Dabare, Managing Director for Identity & Access Management, MUFG

It has always been important to have a handle on who has access to what resources. If you don’t know who has access and who is who-how can you prevent bad things from happening? Managing who has access to resources is the foundation of any...

Enterprises Beef Up Cybersecurity to Quash Cyber Attacks
Enterprisesecuritymag >> cxoinsights

Technology has reached the remotest locations in recent years. The Internet has opened new horizons and a sea of opportunities for businesses all over the world. Enterprises can now connect with their customers more effectively. A huge pipeline of...

Importance of Cyber Hygiene
Enterprisesecuritymag >> cxoinsights

Darren Death, CISO, ASRC Federal

Cybersecurity took a special place in the 2017 news cycle of as organization after organization fell victim to cyberattacks. It used to be that you would have to break into an organization’s physical building to take their secrets. We now...

Security and Vulnerability Assessments through Cloud Platforms
Enterprisesecuritymag >> cxoinsights

While organizations face many issues with data security, cloud providers have today convinced them that the data is secured. Public cloud environments like AWS represented a reduced security burden for the companies. Cloud manager has to monitor...

The Security Industry's Largest Blind Spot That We Are Too Afraid to Talk About
Enterprisesecuritymag >> cxoinsights

Matthew McKenna, Technology Evangelist, SSH Communications Security

Imagine access that could be self-provisioned without oversight and that never expired. What’s more, you had no way of knowing to whom that access belonged. Would you be concerned? Now, what if I told you that this access was touching the...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cioviewpoint

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cxoinsights

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

The Problem with I&AM (Identity & Access Management)
Enterprisesecuritymag >> cioviewpoint

Gehan Dabare, Director for Identity & Access, Bank of Tokyo-Mitsubishi

It has ALWAYS been important to have a handle on who has access to what resources. If you don't know who has access and who is who - how can you prevent bad things from happening? Managing who has access to resources is the foundation of any...

Vulnerability Management - A Business's Cyber Shield
Enterprisesecuritymag >> cioviewpoint

The rapid advancements in technology has paved way for hackers to find new ways of breaking in and accessing corporate networks or business systems. Vulnerabilities in the software are consistent avenues for hackers to exploit businesses, keeping...

Vulnerability Management: The Game-Changer Enterprises are Waiting for
Enterprisesecuritymag >>

Bill Swearingen¸ Director of Centurylink

As businesses work through their digital transformations, leveraging the latest software and cloud technologies to enhance customer experience and streamline operations, they do so against an unfortunate backdrop of unprecedented growth in...

Securing Mobile Devices with Advanced Hardware Technology
Enterprisesecuritymag >>

Though highly advanced in some of the aspects, mobile software protection is nearing its limit. Because this form of security is based on a software protecting another software, it somehow fails to be as reliable as hardware-backed protection....

Eliminating Passwords: The Journey
Enterprisesecuritymag >>

Bret Arsenault, CVP & CISO, Microsoft

According to one estimate, the average person has 27 online accounts with user names and passwords. Choosing the right password is as confusing as trying to remember dozens of passwords—it should be complex, more than 8 characters long, it...

The Industrial IoT Attack Surface
Enterprisesecuritymag >>

Matt Griffiths, CIO, Stanley Black & Decker Industrial

Across the Industrial Manufacturing sector, the average plant & equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...

Cybersecurity Strategy - Do You Have One Yet?
Enterprisesecuritymag >>

Dina Moskowitz, CEO and Founder, SaaSMAX Corp

Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats,...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >>

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >>

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...