Innovation is the Key to Success
Enterprisesecuritymag >> cioviewpoint

Kim Jacques, CIO, Lombard International

What do you see as a big challenge in technology today? If you were to write down a wish list, what solutions are you looking forward to and what are your expectations from technology providers? In my opinion, the biggest challenge we face...

The New Business Imperative: Identity Protection
Enterprisesecuritymag >> cxoinsights

Joy Chik, Corporate VP, Microsoft

My journey to my current role as the CVP of Microsoft’s Identity Division started with an engineering internship on Microsoft’s Exchange team in 1996. I’ve had the honor of partnering with countless businesses to help them...

The Modern World of Identity and Access Management
Enterprisesecuritymag >> cxoinsights

Melinda Hanford , Systems Analyst Supervisor, Children's Hospital of Philadelphia

1. In the light of your experience what are the trends and challenges you’ve witnessed happening with respect to the Identity and access Management space? Some of the trends in the Identity and Access Management space are very comparable...

Reduce Risk and Improve Security with Cloud Security Solutions
Enterprisesecuritymag >> cioviewpoint

Compared to traditional IT security, Cloud computing security is a fast-growing service that provides many functionalities which includes protecting critical information from theft, data leakage, and deletion. Deployment of cloud...

Cloud Services: End to End Encryption in the Retail Industry
Enterprisesecuritymag >> cxoinsights

In the current business world, everything is being transformed at rocket speed and so the requirements and the necessities of the enterprises which are trying their best to keep pace with this real change and to be a part of it. A rapid and...

Securing Cloud-Based Applications with IoT and AI
Enterprisesecuritymag >> cioviewpoint

Today, no industry is untouched from cloud computing. Technologies like the internet of things (IoT), artificial intelligence (AI), machine learning, software as a service (SaaS) and many more, are often integrated with the cloud for...

The Crucial Factors for Stronger Authentication
Enterprisesecuritymag >>

Alex Wood, CISO, Pulte Financial Services

he FBI reported that in 2017 over 9,600 individuals were targeted in real-estate based wire fraud schemes resulting in over $56 million in losses. The Verizon Data Breach Investigations Report found that 95 percent of all data breaches tied...

Implementing Multifactor Authentication - 38 A Required Enabler of Digitization
Enterprisesecuritymag >>

Stephan Hundley, Director Digital Risk, Governance and Security, TTX

Identity is the new security perimeter, and is a core component of a modern security program. Business, Community, and Governmentleaders envision the economic potential ofthe digitization of all aspects of our environment, business, and society...

Zurich Collaborates with riskmethods on Supply Chain Risk Management Services
Enterprisesecuritymag >>

Riskmethods, a pioneer in supply chain risk management has partnered with Zurich Insurance Group and announced an agreement that provides Zurich’s commercial customers with new supply chain risk management services. The agreement allows...

Cloud Cybersecurity Strategies for Businesses
Enterprisesecuritymag >>

The cloud-based services enable agile, efficient and flexible IT models that deliver significant cost savings. The functions of cloud comply with cybersecurity standards guaranteeing the integrity of the data of the users and...

Elastic Safety: The New Security for Companies against Security Threats
Enterprisesecuritymag >>

The recent breach of Marriott– just after the Equifax incident– shows that traditional security approaches do not work. Why do gaps occur year after year? The reason is simple (although there's no solution). Because IT...

Managed Cloud Security Services to Increase Visibility
Enterprisesecuritymag >>

The evolving cybersecurity threats have made the users of the cloud-platforms afraid, but in this competitive age, it is impossible to neglect the existence of the cloud. LogicMonitor's survey has pointed out that 83 percent of enterprise...

Internet of Things Empowering Various Business Industries
Enterprisesecuritymag >>

Everything connects with the Internet of Things system delivering as SaaS (Software-as-a-Service) solutions that helps business industries increase the speed of innovation and reduce their go-to-market cycle. With the growing need for data,...

Factors that Contributed to the Adoption of Cloud Services
Enterprisesecuritymag >>

Cloud computing tools are now indispensable for organizations. Modern cloud computing services are highly distributed, scalable and resilient and allow enterprises to connect remotely. Cloud service providers provide unlimited size, breadth of...

Future trends of Artificial Intelligence
Enterprisesecuritymag >>

Artificial Intelligence soon will be widely used in agriculture, education, defense, cybercrime, logistics, manufacturing industries, etc for optimized solutions. Privacy-enabled AI platforms, smartphones with AI chips can emerge in the market. AI...

Leading BAS Vendors Providing High-end Security
Enterprisesecuritymag >>

The number of cyber crimes has been increasing day to day. As the possibility of being hacked is high, many B2B companies have focused on additional security solutions to protect their company from cyberattacks. Breach and attack simulation (BAS)...

Cloud Security Risk Assessment
Enterprisesecuritymag >>

Multi-cloud is the next trend, and DevOps engineers must be knowledgeable in Amazon Web Services (AWS) and Microsoft Azure. Cloud computing delivers excellent security, but it has issues. It is unclear how sensitive data is being protected in...

Reliability and vulnerabilities of Cloud Security to watch in 2019
Enterprisesecuritymag >>

Several enterprises opt to move to the cloud because of numerous potential benefits like elasticity, Pay per use, migration flexibility, and workload resilience. Microsoft Azure, Google Cloud Platform and other providers have joined AWS in...

Cloud To Enhance Physical Security as a Service
Enterprisesecuritymag >>

The Cloud storage has been widely embraced by businesses for storing the data and just the normal data even financial records and documents but when it comes to physical security enterprises still are reluctant to embrace cloud technology in it....

The Impact of the Cloud on Information Security
Enterprisesecuritymag >>

Vennard Wright, Chief Information Officer, WSSC (Washington Suburban Sanitary Commission)

As a CIO for the Wash­ington Suburban Sanitary Commission (WSSC), which is a 100-year-old public wa­ter utility serving 1.8 million customers in Maryland, across 475,000 accounts, I’ve realized the challenge of balancing evolving...