enterprisesecuritymag

roi

Android in Enterprise BYOD
Enterprisesecuritymag >> cxoinsights

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

You Want to Do What With your Data?
Enterprisesecuritymag >> cxoinsights

Andrew Sohn, SVP - Global Digital and Analytics Srvcs, Crawford & Company

Any business that’s over a few months old has a lot of data. Businesses that are several years old have tons of data. Large, established businesses and digital native companies are drowning in data, and are having a hard time just figuring...

Cyber Attacks to Watch out for in 2019
Enterprisesecuritymag >> cxoinsights

Cybersecurity witnessed a rapid multiplication of high-profile breaches and phishing attacks and in 2019 there may be the more of same.  The companies must secure their privileged accounts, eliminate excessive user privileges, prioritize...

Data is the Lifeline of Today's Businesses; But Why Are So Many Business Leaders Still Making Guesswork?
Enterprisesecuritymag >> cxoinsights

Eric Thain, General Manager, HK Express

There is no doubt on the importance of data in today’s businesses. The C-Suite recognizes the need to focus on data and in fact, data and analytics ranks the highest of the top five investment priorities for CEOs today (according to the...

Leading the Technological Wave
Enterprisesecuritymag >> cioviewpoint

Denise Dettingmeijer, CFO, Randstad North America

Current Role of a CFO I have always had IT report to me as the Chief Financial Officer (CFO). It was an eye-opening transition for me as CFO of Randstad, when figuring out how to place the business, company and external functions around an IT...

The Challenges of Online Payments
Enterprisesecuritymag >> cioviewpoint

As technology advances in smartphones and e-wallets; purchase patterns change, and demand for cross-border multi-currency electronic payments increase, providers are under pressure to provide peer-to-peer payments beyond traditional banking...

Integrating Drones into the Most Complex Airspace in the World
Enterprisesecuritymag >> cxoinsights

Sean S Torpey, Director of Infrastructure and Operations, FAA

Every day, more than 2 million passengers and 50,000 tons of cargo fly on 27,000 commercial flights within 5 million square miles of U.S. airspace. At any given time, roughly 7,000 pilots are airborne in aircrafts of different shapes and...

CIO Hall of Faces
Enterprisesecuritymag >> cioviewpoint

Tom Basiliere, CIO, Provant

Among the many kingdoms in the popular “Game of Thrones” series, there is a secluded island that is home to an ancient temple and a clan of assassins. In this temple, there is a special room called the Hall of Faces. Arya, one of the...

AI becomes "Personal"
Enterprisesecuritymag >> cioviewpoint

Sherif Mityas, CIO & CSO, TGI Fridays

Imagine it’s Thursday night, the kids have soccer practice and you’re always looking for a place to pick-up dinner on the way home. The kids love pasta, your spouse prefers salad, and you’re craving your favorite burger. But the...

Securing Mobile Devices with Advanced Hardware Technology
Enterprisesecuritymag >> cioviewpoint

Though highly advanced in some of the aspects, mobile software protection is nearing its limit. Because this form of security is based on a software protecting another software, it somehow fails to be as reliable as hardware-backed protection....

Journey from Intelligent Automation (IA) to Artificial Intelligence (AI)
Enterprisesecuritymag >> cxoinsights

Sanjay Choubey, VP-IT, Briggs & Stratton

Imagine it’s Thursday night, the kids have soccer practice and you’re always looking for a place to pick-up dinner on the way home. The kids love pasta, your spouse prefers salad, and you’re craving your favorite burger. But the...

The Power of Artificial Intelligence (AI)
Enterprisesecuritymag >> csoinsight

Aaron Gette, CIO, The Bay Club Company

If you’re an avid fan of HBO's Silicon Valley, as I am, you may have recently downloaded the iOS app “Not Hotdog,” that was introduced on the show and developed in real life using real AI, in a ruse of ingenious marketing....

The Next Phase of Video Surveillance
Enterprisesecuritymag >> cxoinsights

A video surveillance system has become an inevitable part of most businesses today to keep an eye on the events and happening in the workplace. Many business owners today need the convenience and ease of viewing live video even while they are away...

Evolving Data Security Involves Database Architecture
Enterprisesecuritymag >> cxoinsights

Tom Basiliere, CIO, Provant

A few weeks ago, my wife got a call from my daughter. She called to ask us about the risk of using a mobile funds exchange service that required her to enter her bank account number into a mobile app so that funds could be transferred in and out...

Pushing the Needle of Innovation in Banking
Enterprisesecuritymag >> cxoinsights

Jojo Seva, CIO, NEFCU

Technology and NEFCU NEFCU is in a transformational phase where we intend to leverage existing and emerging technologies to be more strategic. For me, the essence of strategy is to create competitive advantage. Simply having a technology...

Is Your Corporation Suffering From 'Data Sprawl'?
Enterprisesecuritymag >>

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3 Information today moves at a breakneck speed and the amount of data produced worldwide every day is staggering. With each new device and system added to a network, a...

Addressing Cyber Attacks
Enterprisesecuritymag >>

Mark Connelly, CISO, Boston Consulting Group

Cyber attacks are in the news every day. The frequent headlines and intense media scrutiny have brought the topic to the forefront of public attention. Could this be the worst of times for information security? Given the reports, it may seem...

Think Fighting Email Fraud is Someone Else's Job? Here's the Real Cost of Doing Nothing
Enterprisesecuritymag >>

Dennis Dayman, Chief Privacy and Security Officer at Return Path

Cyberattacks against your brand can be very damaging and costly to both your revenue and your reputation. Cyberattacks are more than someone breaking into your databases or systems and stealing data; instead, this term refers to fraud and the...

Think Fighting Email Fraud is Someone Else's Job? Here's the Real Cost of Doing Nothing
Enterprisesecuritymag >>

Dennis Dayman, Chief Privacy and Security Officer at Return Path

Cyberattacks against your brand can be very damaging and costly to both your revenue and your reputation. Cyberattacks are more than someone breaking into your databases or systems and stealing data; instead, this term refers to fraud and the...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >>

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...