enterprisesecuritymag

security threats

Dealing with Network Security Threats the Right Way
Enterprisesecuritymag >> cioviewpoint

In today’s expanding IT environment, collecting network usage data and deploying firewalls to monitor a network is hardly a standard procedure. Relying solely on endpoint monitoring can put insights on the network traffic and the overall...

Augmenting Cybersecurity in Healthcare Industry
Enterprisesecuritymag >> cxoinsights

Robert Napoli, CIO, Planned Parenthood of the Great Northwest and the Hawaiian Islands

The levels of cybersecurity threats have significantly increased over the past decade posing significant challenges in the healthcare organizations. In order to tackle these security issues, most organizations invest a lot of time and money to...

The Future Belongs to the Informed
Enterprisesecuritymag >> cxoinsights

Anthony J. Scriffignano, SVP-Worldwide Data

Anthony J. Scriffignano, SVP-Worldwide Data & Insight, Dun & Bradstreet Much like the cortex of the brain and frontal lobes associated with self-control, planning, reasoning and abstract thought, Big Data synthesis is central to the...

Is Your Corporation Suffering From 'Data Sprawl'?
Enterprisesecuritymag >> cxoinsights

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3 Information today moves at a breakneck speed and the amount of data produced worldwide every day is staggering. With each new device and system added to a network, a...

The Right Side of the Analytics Revolution Begins with Underwriting
Enterprisesecuritymag >> cxoinsights

Dax Craig, Chief Executive Officer and President, Valen Analytics

Dax Craig, Chief Executive Officer and President, Valen Analytics As the adoption of data and predictive analytics continues to grow in property/casualty (P&C) insurance, so does the segmentation and sophistication of the market. As a...

Putting Customers in Control of their data
Enterprisesecuritymag >> cxoinsights

Marty Ellingsworth, President, Salt Creek Analytics

Marty Ellingsworth, President, Salt Creek Analytics Now that “everyone has a smartphone” and the sharing economy is in full swing, companies engage customers and do more via mobile, cloud, and analytic platforms. Variety of new...

Transforming Your Business through Secure Mobile Strategies
Enterprisesecuritymag >> cxoinsights

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung

Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung All too often, I see organi­zations that are looking to improve their mo­bile strategies fall into the same patterns and quicksand in these efforts....

How to get your information security to lift more weight
Enterprisesecuritymag >> cxoinsights

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security

Carric Dooley , Worldwide VP of Foundstone Services, Intel Security Information security sometimes appears to be stuck, still suffering from the same basic problems: weak passwords, unpatched vulnerabilities, and too much (or too little)...

The Changing Face of CDN
Enterprisesecuritymag >> cxoinsights

Will Hughs, President, Americas-Global Head of OTT, Telstra

Will Hughs, President, Americas-Global Head of OTT, Telstra In today’s competitive business world, organisations are always looking to improve the user experience for their customers and in doing so, gain an important competitive...

Where There's Smoke There's A DDoS Attack
Enterprisesecuritymag >> cxoinsights

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab

Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky Lab In many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services....

Safer Deposits: Beating the Cyber-threats Targeting Banks
Enterprisesecuritymag >> cioviewpoint

Gadi Naveh, Threat Prevention Evangelist, Check Point Software Technologies, Ltd

When the prolific career criminal Willie Sutton was asked why he specifically targeted banks, he reportedly replied: “Because that’s where the money is.” So it’s no surprise that cyberattacks against banks have increased...

Consolidation of GSA IT
Enterprisesecuritymag >> cioviewpoint

David Shive, CIO, GSA

David Shive, CIO, GSA On July 30 of this year I was honored to be named the Chief Information Officer (CIO) of the United States General Services Administration (GSA). The role of CIO here at GSA comes with a legacy of innovation, early...

Leading IT through Collaboration
Enterprisesecuritymag >>

Brenda Decker, CIO, State of Nebraska

Brenda Decker, CIO, State of Nebraska Each and every day the Chief Information Officer of any organization is presented with new opportunities to use technology to provide services to constituents. State Government CIO’s are no...