enterprisesecuritymag

software

Cybersecurity - Its Significance in the Business
Enterprisesecuritymag >> cioviewpoint

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack–struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity solutions....

Backup Strategies for Software Upgrade
Enterprisesecuritymag >> cxoinsights

The evolution of software has made possible things we never dreamed of. With software upgrades comes new capabilities and competencies—better security, speed, power and sometimes disruption. Whenever something new enters the existing system,...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

How to Protect Your Business by Following The Ten P's of Security
Enterprisesecuritymag >> cioviewpoint

Michael Meyer, Chief Risk Officer (CRO) and Chief Security Officer (CSO), MRS BPO, LLC

How many times have you heard from your staff – buy this technology and all of our (and your) worries and problems go away? Maybe it sounded like this instead--this is the latest and greatest technology; we need it to solve every security...

Significance of Cloud Security in Businesses
Enterprisesecuritymag >> cioviewpoint

Cloud technology has been under scrutiny by both critics and experts. Cybercrime industry has hindered the adoption of the technology, but experts still believe that it is more secure than any other private communication and IT network linked to...

Cybersecurity-Its Significance in the Business
Enterprisesecuritymag >> cxoinsights

Jaya Baloo, CISO, KPN Telecom

The scars of WannaCry hadn’t healed yet when Petya–a new ransomware attack– struck organizations across Europe, haunting the cybersecurity world in 2017. This further emphasized the need for avant-garde cybersecurity...

The Job of Cybersecurity is Presently Addressed as an
Enterprisesecuritymag >> cxoinsights

Paul Garrin, CIO Partner, Tatum, A Randstad Company

Cybersecurity is an IT voice/data network vertical that keeps some CIO’s awake at night. The history of the office of the CIO has evolved over time. Early on, the CIO ran IT and simply managed the hardware platforms, computers, firewalls,...

Cloud Management Platforms that are Spearheading Innovation
Enterprisesecuritymag >> cxoinsights

Cloud management platforms are technologies utilized to operate and monitor data, services, and applications on the cloud. In determining the most efficient cloud management software, a number of features, such as flexibility, security,...

Fostering the Culture of 'Security as a Valued Skill' to the Organization
Enterprisesecuritymag >> cxoinsights

Dr. Andreas Kuehlmann, SVP and General Manager, Synopsys Software Integrity Group

• What do you think are the biggest obstacles that technologists face in working in a more agile and outcomes based model? As organizations transition to a more agile and continuous development model, software security needs to be...

Fostering the Culture of 'Security as a Valued Skill' to the Organization
Enterprisesecuritymag >> cxoinsights

Dr. Andreas Kuehlmann, SVP and General Manager, Synopsys Software Integrity Group

• What do you think are the biggest obstacles that technologists face in working in a more agile and outcomes based model? As organizations transition to a more agile and continuous development model, software security needs to be...

How to Ensure Information Security when Outsourcing Your Projects
Enterprisesecuritymag >> cxoinsights

Sergiy Korniyenko, COO, Agiliway

Information security is one of the most concerning issues for those who are thinking about outsourcing their software development or administrative projects. For many people, this is a showstopper which prevents them from making the first step and...

The Arising Need for Shift Left Security
Enterprisesecuritymag >> cioviewpoint

The growing culture in organizations to take an agile and DevOps approach to software application development is due to the ever-increasing dependency on software. In order to meet demands for a faster time to market, developers now play an active...

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cioviewpoint

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

Why our Security Problems are Getting Worse...
Enterprisesecuritymag >> cioviewpoint

Jeff Schwartz, VP, North America Engineering, Check Point Software Technologies

Security spending is up 8 percent year over year, yet security incidents are up ~40 percent. Why does the security “ball of yarn” continue to unravel as we pull the string. In this article, you will learn why our security problems...

Talking about Thinking Machines
Enterprisesecuritymag >>

Dave Schubmehl, Research Director, IDC

As the market for intelligent applications and the software platforms used to build them has emerged over the last few years, there has been a lot of nomenclature confusion. What should we call these applications and what should we call the...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >>

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >>

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Blockchain for the Enterprise
Enterprisesecuritymag >>

Aaron Gette, CIO, The Bay Club Company

Most organizations have not implemented blockchain, but few are venturing into the development stage of projects and decentralized applications. There’s immeasurable hype and promise, backed by an intense amount of research and investment...

The Evolution of SD-WAN Network Architecture
Enterprisesecuritymag >>

The provisioning and functioning of VPN services have significantly evolved rapidly over the last few years. While the burden of enormous hardware requirement has troubled most organizations, Software Defined WAN (SD-WAN) is the go-to solutions,...

The Evolution of SD-WAN Network Architecture
Enterprisesecuritymag >>

The provisioning and functioning of VPN services have significantly evolved rapidly over the last few years. While the burden of enormous hardware requirement has troubled most organizations, Software Defined WAN (SD-WAN) is the go-to solutions,...