enterprisesecuritymag

virtualization

Assessing the Threats in Cloud Security
Enterprisesecuritymag >> cxoinsights

Shane Creech, Director of Infrastructure, New Hanover Regional Medical Center

Shane is a visionary and transformational Information Technology executive with in-depth experience in guiding IT strategic and tactical planning, fostering innovation, prioritizing IT initiatives, and coordinating current and future IT systems...

Managed Security Services Do Not Replace Knowing What Your Organizational Needs Are
Enterprisesecuritymag >> cioviewpoint

Lester Godsey, CISM & PMP, Chief Information Security and Privacy Officer, City of Mesa

Everything is symbiotic in technology, especially these days: outsourcing operations like Security Operation Center functions are only possible due to the number of Managed Security Services, which in turn is only possible due to technology...

These Five Innovations are Changing How you will Secure your Digital Operations
Enterprisesecuritymag >> cxoinsights

Andrew Kling, Director of Cybersecurity and Software Practices, Process Automation Business, Schneider Electric

Today, there is more technology-driven possibility at our fingertips than ever before. Within the manufacturing industry, the industrial internet of things (IIoT) and digital tools like artificial intelligence (AI) and augmented reality are being...

Mobility Landscape in Healthcare
Enterprisesecuritymag >> cioviewpoint

Steve Crocker, Chief Information Security Officer at Methodist Le Bonheur Healthcare

Security leaders are constantly challenged by threats from the growing use of mobile devices in the workforce. Nowhere is this more evident than in the healthcare industry. Healthcare has recently seen an explosion of technology innovation aimed...

Cloud Security Amplifying Business Growth
Enterprisesecuritymag >> cioviewpoint

Chris White, Deputy CISO, Interpublic Group[NYSE:IPG]

The influx of humungous amounts of data pertaining to customers, employees, and external stakeholders has elevated the need for its protection. What better way than to migrate and maintain all this data in the cloud, thus creating the most...

Container Security Services Driving the IT Efficiency
Enterprisesecuritymag >> cioviewpoint

Current IT companies are constantly advancing to transform approaches for software development to deliver fast software. As a result, container technology is a favored way to package and deploy software. The arrival on the market of a number...

Morphing Enterprise Architecture Tramples Security Capabilities
Enterprisesecuritymag >> cioviewpoint

Connie Barrera, CISO at Jackson Health System

Enterprise IT architectures have become a mammoth web of different solutions and technologies across all business sectors. From manufacturing to healthcare, the rapid adoption of cloud, mobile, and virtual technologies, has placed a strain on even...

Major Security Lapse at Nasa: Inquiry Confirms High-end Hack Last Year
Enterprisesecuritymag >> cxoinsights

A federal probe into the April 2018 high-end security breach on NASA’s Jet Propulsion Laboratory has revealed shocking details which will certainly trigger enormous changes in the existing security measures at NASA. Fremont, CA: NASA, the...

How 5G Security Issues are Resolved Keeping Expense in Check
Enterprisesecuritymag >>

FREMONT, CA: Today’s infrastructure intimidations will have significant repercussions on tomorrow’s 5G commercial networks, which requires a high level of automation in security on-boarding, scale-out, and attack mitigation. 5G network...

Cybersecurity solutions for BYOD trend in Healthcare Industry
Enterprisesecuritymag >>

The healthcare IT environment has evolved over the years with the introduction of various emerging technologies. Technologies like the Internet of Medical Things (IoMT) have grown significantly, which has made the healthcare IT environment more...

Prioritization-The Key to Effective Vulnerability Management
Enterprisesecuritymag >>

Genady Vishnevetsky, Chief Information Security Officer, Stewart

For decades we have been trying to solve the problem of managing vulnerabilities. However, looking at security breaches over the last fifteen years, we are not making much progress. Why is that we have not been able to solve this problem? First,...

Wide Range of Security Solutions through Kaspersky's Single Platform
Enterprisesecuritymag >>

With growing companies, there is an increase in the number of attackers targeting companies' data, finance, and reputation. Kaspersky Labs, the security vendor, warns companies of such threats that are now entering the corporate world. In...

VMware Launches Service-Defined Firewall for Intrinsic Security
Enterprisesecuritymag >>

VMware announces the launch of its new product, service-defined security firewall. Applying its IT proficiency to produce security tools and devices, VMware has come up with a cybersecurity firewall. This latest release is an all-new...

Leveraging Technology for an Effective Enterprise Networking
Enterprisesecuritymag >>

The digital transformation has induced an exceptional growth in the connected device sales. This growth has resulted in a surging demand for real-time and secure communication between devices, driving global enterprise networking to overcome the...

Implementations of Artificial Intelligence and Machine Learning
Enterprisesecuritymag >>

Artificial intelligence (AI) and machine learning (ML) are the new age technologies that already have made an impact on the workflow of industries. Tech giants have utilized them optimally and continue to do the same as these...

DevOps Automation: the key to Managing Machine Identities
Enterprisesecuritymag >>

Manual managing machine identities can lead to some specific cybersecurity problems. DevOps is perceived to be agile, and it defeats the purpose of agility when the work is manual. The time spent on manual management of machine identities can...

Security and Vulnerability Assessments through Cloud Platforms
Enterprisesecuritymag >>

While organizations face many issues with data security, cloud providers have today convinced them that the data is secured. Public cloud environments like AWS represented a reduced security burden for the companies. Cloud manager has to monitor...

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >>

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

Three Innovative Cybersecurity Technologies of 2018
Enterprisesecuritymag >>

The ongoing war between security experts and cyber actors have become a cat and mouse game. This era of digital transformation is affecting the cybersecurity, and therefore this ever-changing industry has to be more responsible regarding the cyber...

Information Security Means Never Being Done
Enterprisesecuritymag >>

Dan Callahan, VP, Cloud Services, CGNET

Do you recall the story of Sisyphus? He was the Greek god whose punishment for a life of indiscretions was to roll a boulder to the top of a hill—and then watch as it rolled to the bottom. Managers in charge of information security can...