enterprisesecuritymag

operating systems

Protecting Legacy and Next-Gen Networks
Enterprisesecuritymag >> cxoinsights

Brad Boston, President & CEO, NetNumber

As the former CIO at Cisco, security was one of those concerns that kept me awake at night— specifically, protecting our infrastructure and intellectual property, and ensuring we protected the information of our employees, customers, and...

Taking control of IT Operations through the Critical Security Controls
Enterprisesecuritymag >> cxoinsights

Matthew J. Harmon, Principal Consultant, IT Risk Limited

These systems become a pivot point for infiltration, allowing for escalation of privileges and network visibility through a patient and opportunistic approach slowly spreading through the environment. The strategy to prevent this type of...

Taking control of IT Operations through the Critical Security Controls
Enterprisesecuritymag >> cxoinsights

Matthew J. Harmon, Principal Consultant, IT Risk Limited

These systems become a pivot point for infiltration, allowing for escalation of privileges and network visibility through a patient and opportunistic approach slowly spreading through the environment. The strategy to prevent this type of...

Denial of Service Attacks: From Bandwidth to APIs
Enterprisesecuritymag >> csoinsight

Edward G. Amoroso, SVP & CSO, AT&T

In the months leading up to the Millennium change, the Clinton White House was developing a comprehensive fusion center in Washington, DC to monitor the Y2K transition status of IT systems around the world. The idea was that domestic and...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >> cxoinsights

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> csoinsight

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

The Weakest Link Is Your Strongest Security Asset
Enterprisesecuritymag >> cioviewpoint

Christian Anschuetz, CIO & Security Practitioner, UL

Despite Firms' Best Efforts, Security Vulnerabilities Are Increasing From the infamous Sony hack and other high-profile data breaches to Heartbleed, Shellshock and the new wave of mass mobile threats, 2014 was an historic (if woeful) year...

Why IT Security And SCADA/ Manufacturing Security Are Different
Enterprisesecuritymag >> cxoinsights

Eric Byres, CTO , Tofino Security, A Belden Brand

The Times, They are A’changing Industrial SCADA, ICS and manufacturing systems once ran on proprietary networks, used proprietary equipment, and were isolated from business networks and the internet. Life was simpler for both the IT manager...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >> cxoinsights

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...

Taking control of IT Operations through the Critical Security Controls
Enterprisesecuritymag >> cxoinsights

Matthew J. Harmon, Principal Consultant, IT Risk Limited

These systems become a pivot point for infiltration, allowing for escalation of privileges and network visibility through a patient and opportunistic approach slowly spreading through the environment. The strategy to prevent this type of...

Security of Cloud Computing
Enterprisesecuritymag >> cxoinsights

Anthony Scarola, CISSP, Director of Technical Information Security, TowneBank

Ugh, “cloud”. The term and how it has been applied to hosted computing services is disappointing. Hosting providers have repurposed the cloud placeholder— typically used by network engineers to depict complex, yet understood...

Data Security Should Be a Top HR Priority
Enterprisesecuritymag >> cxoinsights

William J.T. Strahan, EVP-HR, Comcast Cable

It is almost clichéd for an HR manager to cite confidentiality to avoid talking about details regarding everything from health care benefits to employee relations to pending promotions and terminations. In a world where personal privacy...

BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security
Enterprisesecuritymag >> csoinsight

Dan Lohrmann, Chief Strategist & CSO, Security Mentor

Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi. Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an...

SecondWrite: Revolutionizing Malware Detection
Enterprisesecuritymag >> vendor

Ed Jaehne, President and CEO

SecondWrite delivers deep and actionable insights into malware with ease and cost-efficiently. The threat management solutions company ushers in deep learning and forced code execution to the battle against advanced malware. Their next generation...

ReaQta: Artificial Intelligence-Powered Threat Response
Enterprisesecuritymag >> vendor

Alberto Pelliccione, CEO

ReaQta is a leading cybersecurity solutions company that provides a highly intelligent, AI-powered endpoint threat response solution to organizations of all sizes to monitor and remediate online threats. Their endpoint threat response platform is...

akquinet AG: The International SAP Security Specialist
Enterprisesecuritymag >> vendor

Ralf Kempf, Technical Managing Director

With the adaptation of technology, companies are struggling to protect their data. Most of the companies in Europe have already been a victim of data theft, breaches, hacking incursion, or industrial espionage. To address these issues, the...

Gemalto: Securing the Connected World
Enterprisesecuritymag >> vendor

Philippe Vallée, CEO

The interaction and online activities are increasing tremendously with digitalization leading to the generation of a massive amount of personal data. This creates ample opportunities for service providers, but at the same time, it could be...

HID Global: Powering Trusted Identities
Enterprisesecuritymag >> vendor

Pan Kamal, VP of Product Marketing

HID Global, a foremost multifactor authentication solution company, provides identity and access management solutions to a wide range of industries. The company works with governments, universities, hospitals, financial institutions, and some of...