enterprisesecuritymag

software

Boosting Productivity with a Healthy Software Stack
Enterprisesecuritymag >> cxoinsights

Adrienne Weissman, Chief Crowd Officer and EVP of Partnerships, G2 Crowd

Your software stack is the assortment of software you need to do your job. In many ways, it’s a lot like the human body. Main programs provide vital services, like the brain and heart, while add-ons supplement your day-to-day processes, like...

The Transformative Role of Software for Payments: Synergies, Opportunities and the Retail Experience
Enterprisesecuritymag >> cxoinsights

Amy Zirkle, Vice President, Industry Affairs, Electronic Transactions Association

There are few industries yet untouched by the tidal wave of technological innovation. Where there is a product to be developed or a service to be delivered, technology is rapidly transforming its related workflows, supply chains, and...

The Industrial IoT Attack Surface
Enterprisesecuritymag >> cioviewpoint

Matt Griffiths, Vice President, Data-Driven Transformation, Stanley Black & Decker, Inc.

Across the Industrial Manufacturing sector, the average plant and equipment lifespan is around 20 years. To put that in context; 20 years ago, Windows 98 & Visual Basic 6.0 had just been released by Microsoft, Google had just hired their...

The Cloud- First Approach
Enterprisesecuritymag >> cxoinsights

Arjun Chopra, Partner, Floodgate

Could you give me an overview of the types of opportunities you pursue as a Partner at Floodgate? I believe that the public cloud represents a generational platform shift that has delivered not only the fastest growing enterprise software...

AI is the New UI-AI + UX + DesignOps
Enterprisesecuritymag >> cxoinsights

Amit Bahree, Executive, Global Technology and Innovation, Avanade

Today you cannot read any technology or business article without some discussion around Artificial Intelligence (AI), whether explicit or implicit. We see AI integrating deeper in all elements of our life–be it at home with our families, or...

Security Advantages of Software Defined Networking (SDN)
Enterprisesecuritymag >> cxoinsights

Dr. Edward Amoroso, Member of the Board of Directors, M&T Bank

Perhaps the defining aspect of wide-area routing over Internet infrastructure has been decentralized control. Routers are manufactured to support protocols as stand-alone entities that accept, process, and route packets independently based on...

A Closer Look at Block Chain Technology
Enterprisesecuritymag >> cioviewpoint

John Shea, CIO, Eaton Vance

As the CIO of Eaton Vance, I’d be compelled to say that the role of a CIO has advanced over the years. Fortunately, I started off in financial services and got some first-hand experience on software development and was able to inculcate...

Software-Defined Security: The Missing Piece in Your SDDC Strategy
Enterprisesecuritymag >> cxoinsights

Shishir Singh, VP, Network Security, Intel Security

It seems the stars are finally aligning to bring the much-promised benefits of the software-defined datacenter within reach of enterprise users. You know the promises: When our data centers are software-defined, we'll deliver new services...

Hiding in Plain Sight: The DNA Molecule as Next-Generation Cyber-Physical Network Security
Enterprisesecuritymag >> cioviewpoint

Judy Murrah, CIO, Applied DNA Sciences Inc

The ultimate challenge: network security. Connected but access-protected. Open standards but private keys. Locked-down but useable. Collaborative but intrusion-protected. From devices to supply chains. Where to begin? Software security has been...

Banking on Trust: The Role of Security
Enterprisesecuritymag >> cxoinsights

Tom Watson, VP IT/Digital, Global CISO, Sealed Air Corporation

Corporate security has often been an afterthought in many industries. Although companies are quick to introduce new software applications, improve network architecture, and adopt cloud for storing data, security aspects of these technologies is...

Banking on Trust: The Role of Security
Enterprisesecuritymag >> cxoinsights

Tom Watson, VP IT/Digital, Global CISO, Sealed Air Corporation

Corporate security has often been an afterthought in many industries. Although companies are quick to introduce new software applications, improve network architecture, and adopt cloud for storing data, security aspects of these technologies is...

Why is Hyper-converged is the new Wave
Enterprisesecuritymag >> cxoinsights

Michael Morey, AVP Infrastructure, National Life Group

It amazes me that the hyper-converged market did not get the attention it deserved until the last several years. Once seen as niche solution providers, the hyper-converged market players are being acquired, showing up in other solution offering...

Enterprise Architecture and Culture: Two Parts of Digital Transformation Success
Enterprisesecuritymag >> cxoinsights

Ethan Pack, Director of Enterprise Architecture and Applications, TDECU

“We really need a digital transformation strategy.” A version of that phrase can be heard coming from many boardrooms and executive teams around the world. Digital business is quite the buzzphrase these days and why shouldn’t it...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Integrating Cloud Capability To Provide Reliability, Authentication, And Messaging Infrastructure
Enterprisesecuritymag >> cioviewpoint

Kim Tracy, CIO, Northeastern Illinois University

Infrastructure To Tackle The Onslaught Of Digital Content And Mobile Devices In being a public university, we look for investments in IT infrastructure that we believe will definitely be of value. Of the key parameters I look at the future...

The Great CIO Myth
Enterprisesecuritymag >> cioviewpoint

David Tamayo, CIO, DCS Corporation

Recently, after participating in a panel of so-called “experts” at the local chapter of the Society for Information Management, a young IT manager came afterwards to ask me, “How can I become a great defense industry CIO?”...

Voyage towards Greater Experience in Banking
Enterprisesecuritymag >> cioviewpoint

Gregory Schwartz, CIO, Scottrade Financial Services

Gregory Schwartz, CIO, Scottrade Financial Services 1. How would you describe the role of a CIO today in Banking and other financial institutions? The traditional role of the CIO to ensure that customer data remains safe and that...

Eze Software: Optimizing Testing For Outcomes
Enterprisesecuritymag >> cxoinsights

James Smith, Senior Managing Director, Eze Software

1.How has your software testing operating model changed during the last five years? Eze Software was formed in 2013, combining Eze OMS, RealTick (now Eze EMS) and Tradar (now Eze Portfolio Accounting). Our development effort has focused on...

Impact of Software Defined Transformation in the Enterprise
Enterprisesecuritymag >> cxoinsights

Vesko Pehlivanov, VP, Cybersecurity, Group CTO, Credit Suisse

Software Defined Networking is dead, long live Software Defined Networking. Software Defined Networking (SDN) never had a clear role in the traditional enterprise. It came in the guise of Open Flow as a solution looking for a problem. And the...

Strong Security - Technology Isn't Everything
Enterprisesecuritymag >> cxoinsights

Michael Meyer, CRO and CSO, MRS BPO, LLC

How many times have you heard—buy this technology and all of our (and your) worries and problems go away? Maybe it sounded like this instead—this is the latest and greatest technology; we need it to solve every security issue. So,...