operating systems

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, CIO, WSSC

As consumers and recipients of services from utilities, our least favorite thing about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Enterprises Beef Up Cybersecurity to Quash Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

Technology has reached the remotest locations in recent years. The Internet has opened new horizons and a sea of opportunities for businesses all over the world. Enterprises can now connect with their customers more effectively. A huge pipeline of...

Importance of Cyber Hygiene
Enterprisesecuritymag >> cxoinsights

Darren Death, CISO, ASRC Federal

Cybersecurity took a special place in the 2017 news cycle of as organization after organization fell victim to cyberattacks. It used to be that you would have to break into an organization’s physical building to take their secrets. We now...

The Security Industry's Largest Blind Spot That We Are Too Afraid to Talk About
Enterprisesecuritymag >> cxoinsights

Matthew McKenna, Technology Evangelist, SSH Communications Security

Imagine access that could be self-provisioned without oversight and that never expired. What’s more, you had no way of knowing to whom that access belonged. Would you be concerned? Now, what if I told you that this access was touching the...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cxoinsights

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Vulnerability Management - A Business's Cyber Shield
Enterprisesecuritymag >> cioviewpoint

The rapid advancements in technology has paved way for hackers to find new ways of breaking in and accessing corporate networks or business systems. Vulnerabilities in the software are consistent avenues for hackers to exploit businesses, keeping...

Vulnerability Management: The Game-Changer Enterprises are Waiting for
Enterprisesecuritymag >> cioviewpoint

Bill Swearingen, Director, Centurylink

As businesses work through their digital transformations, leveraging the latest software and cloud technologies to enhance customer experience and streamline operations, they do so against an unfortunate backdrop of unprecedented growth in...

Securing Mobile Devices with Advanced Hardware Technology
Enterprisesecuritymag >> cxoinsights

Though highly advanced in some of the aspects, mobile software protection is nearing its limit. Because this form of security is based on a software protecting another software, it somehow fails to be as reliable as hardware-backed protection....

Eliminating Passwords: The Journey
Enterprisesecuritymag >> cxoinsights

Bret Arsenault, CVP & CISO, Microsoft

According to one estimate, the average person has 27 online accounts with user names and passwords. Choosing the right password is as confusing as trying to remember dozens of passwords—it should be complex, more than 8 characters long, it...

The Industrial IoT Attack Surface
Enterprisesecuritymag >> cioviewpoint

Matt Griffiths, Vice President, Data-Driven Transformation, Stanley Black & Decker, Inc.

Across the Industrial Manufacturing sector, the average plant and equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...

Network Security: Critical System Defense
Enterprisesecuritymag >> cxoinsights

Thomas P. Gresham, CISO, Port of San Diego

Prior to the Internet, Information Technology (IT) networks were self-contained and relatively free from cyberattacks. Now it is commonplace to read about data breaches, website defacement and system outages. All business supported by IT...

Security and Dealing with Legacy Systems
Enterprisesecuritymag >> cxoinsights

Sean Updegrove, CTO, Keck Medicine of USC

There will always be legacy systems that need to be secured. It is well known in the industry that technology professionals prefer to keep the fact under wraps that legacy systems will always be around. Although we don’t like to talk...

Accounting for Online Payment Security as a Practice
Enterprisesecuritymag >> cxoinsights

Vennard Wright, CIO, WSSC (Washington Suburban Sanitary Commission)

As consumers and recipients of services from utilities, our least favorite things about receipt of those services is paying bills. As service providers, one of the areas of most obvious concern is securing information and data related to those...

Seven security priorities for 2017
Enterprisesecuritymag >> cxoinsights

Jeff Harris, VP of security solutions, Ixia

The enterprise IT security landscape changed dramatically during 2016. Expansion into more clouds, the addition of industrial IoT, and marked increases in virtual deployments resulted in more devices, more locations, and more environments for...

Financial Leadership through Technology
Enterprisesecuritymag >> cioviewpoint

Mike Bailey, CPA, Director of Information Technology, City of Redmond, WA

  Upon arriving at the City of Redmond in 2008 one of the first concerns expressed by our management team was the need to update our financial systems. The systems being used were implemented some time ago and done so in a way that did...

Delivery and Adoption of Cloud Computing
Enterprisesecuritymag >> cioviewpoint

Michael Stoeckert, CTO, ProAssurance

What is “Cloud” ? Cloud computing delivery models provide users with on-demand access to a flexible, wide-ranging pool of technology assets composed of services, applications, servers, networks, and storage facilities. Due to the...

Is Your Corporation Suffering From 'Data Sprawl'?
Enterprisesecuritymag >> cxoinsights

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3 Information today moves at a breakneck speed and the amount of data produced worldwide every day is staggering. With each new device and system added to a network, a...

Unlocking the Power of DoD's Information
Enterprisesecuritymag >>

Terry Halvorsen, CIO, United States Department of Defense

Walking around the Pentagon, I see an enduring and complex building filled with busy halls and numerous entrances enable efficient access for those who work and visit to come and go as necessary. As headquarters of the Department of Defense (DoD),...

How to Curb Security Threats
Enterprisesecuritymag >>

Jason Worley, CIO, Adeptus Health's First Choice Emergency Room

Cyber-security Threats in a High-growth Environment Due to our high-growth healthcare environment, we face pronounced cyber-security challenges. We have grown from about 500 users to over 5,000 users in less than 36 months. During that process,...

Fight Back Against Digital Extortion
Enterprisesecuritymag >>

Eugene Kaspersky, Chairman and CEO of Kaspersky Lab

The world is facing a rising and increasingly dangerous tide of ransomware. It basically comes in two forms. First, there are ‘blockers’–malware that blocks access to a computer’s file system....