enterprisesecuritymag

ssl

The Importance of Conforming to HIPAA for Healthcare Entities
Enterprisesecuritymag >> cioviewpoint

Randall Frietzsche, CISO, Denver Health

If you are a US-based healthcare entity, and you electronically bill for your services, you probably fall under HIPAA regulations. HIPAA requires encryption to protect patient data. This article will discuss the key points of this requirement....

Outcomes Rising from the IT Roadmap Leveraging Microsoft Azure
Enterprisesecuritymag >> cxoinsights

Chad Leverenz, Vice President, Information Technology, Mercy Housing

What does your roadmap entail? What outcomes are you targeting? The following are outcomes for the typical IT roadmap utilizing Microsoft Azure enterprise cloud computing: The demise of LANs and corporate client VPNs Local Area...

What does the Blockchain Mean for Mobile App Security
Enterprisesecuritymag >> cxoinsights

The blockchain records data in hash functions with a timestamp and link to the previous block. These blocks are stored anonymously with other stakeholders in the network and decrease the risk of vulnerability. The digitalized ledger is not limited...

Expanding Role of the CIO with Smart, Connected Products
Enterprisesecuritymag >> cioviewpoint

Steve Dertien, Office of the CTO, PTC

With each new wave of technological innovation, IT becomes a significant facilitator in enabling companies to leverage this technology to capture a first mover advantage, operational effectiveness and competitive advantage.  Twice before over...

Things to Ponder Over before Deploying Next Generation Firewall
Enterprisesecuritymag >> csoinsight

With NHS being a victim of WannaCry, a ransomware, which had devastating effects on all of their computer software, bringing everything to a screeching halt, information security management has become more important than ever. It is time for...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> csoinsight

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Mobility x Security
Enterprisesecuritymag >> cioviewpoint

Daniel Sobral, CSO, JBS USA

Mobile devices, such as tablets, smartphones and cell phones, have become increasingly popular and everyday become more embedded in people’s day-to-day lives. They are able to perform most of the actions taken on computers and notebooks, as...

Mobility x Security
Enterprisesecuritymag >> csoinsight

Daniel Sobral, CSO, JBS USA

Mobile devices, such as tablets, smartphones and cell phones, have become increasingly popular and everyday become more embedded in people’s day-to-day lives. They are able to perform most of the actions taken on computers and notebooks, as...

Examining Past and Future DDoS Attacks: What Enterprises Can Do to Prepare
Enterprisesecuritymag >> csoinsight

Tammy Moskites, CIO/CISO, Venafi

The Internet has technically been around since the 60’s, however academia has been using it since the 80s and commercial use actually began to grow rapidly in the 90’s. In the last 20 years the internet has grown over 100-times to well...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> csoinsight

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> vendor

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Lessons from 2014 for a Better Security Strategy in 2015
Enterprisesecuritymag >> vendor

John McClurg, CSO and VP, Dell

No industry is as accustomed to constant change as IT. Technology is moving forward at such breakneck speed, it’s interesting to remember that many of the most pressing security chal­lenges we face today did not exist 10 years ago, and...

Barracuda: The next level in enterprise security
Enterprisesecuritymag >> vendor

BJ Jenkins, President & CEO

Barracuda is a leading managed security service provider which has been offering security products for data storage and disaster recovery, content security, and networking and applications for more than fifteen years. Initiated with an aim to...

Comodo CA: 360-degree Security Solutions for IoT Devices
Enterprisesecuritymag >> vendor

Damon Kachur, VP of IoT Solutions

Today, companies have an infinite number of websites, servers, mobile devices, and applications which require secure digital identities. A dynamic and automated PKI solution is necessary to protect digital identities against threats and manage...

Cyphre: Razor-Sharp End-to-End Encryption
Enterprisesecuritymag >> vendor

Larry Lozon, Co-founder & Global Product Manager

Companies endure malicious trespasses daily on the corporate network, employee computers, and cloud. Therefore, they spend millions on IT upgrades, insurance premiums, and compliance fines annually; these costs can be cut down by employing the...

Virtis: Mitigating Data Breach with Cutting-Edge Solutions
Enterprisesecuritymag >> vendor

Michelle Wilner, CEO

Virtis is a leading player in delivering artificial intelligence solutions, superior technology, and technical support to safeguard business crucial and high-value assets of leading companies and government organizations across the globe. The...

SecurEnvoy [AIM:SWG]: Secure Authentication with Seamless User Experience
Enterprisesecuritymag >>

Doug Chase, VP Sales for North America

SecurEnvoy is a leading provider of multifactor authentication solutions that employ users’ mobile phones and other personal devices for authentication. As a founder in developing tokenless authentication, SecurEnvoy has enabled more than 1,000...

Secucloud: Revolutionizing Cybersecurity through FWaaS
Enterprisesecuritymag >>

Dennis Monner, CEO

As a provider of firewall solutions, Secucloud GmbH offers a cloud-based security-as-a-service platform for providers in particular. The Elastic Cloud Security System (ECS2) of the company provides for the benefits of enterprise-wide security...