Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Enterprise Security Vendors Need An Infusion Of Open Source Culture

Forrester IT

This week, I attended IBM’s fifth annual Security Summit in New York City, an exclusive event for a who’s who of IBM’s security customers. age of the customer security & risk collaboration innovation open source Security & Risk

Three Security Lessons for the Intelligent Enterprise

CTOvision

Read Susan Galer list three security lessons for businesses on CSO online : The good news about the next era of digital transformation is how companies are becoming intelligent enterprises.

Is your enterprise software committing security malpractice?

Network World

Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user.

Broadcom Buys Symantec’s Enterprise Biz.: Good News For Investors; Bad News For Enterprises

Forrester IT

Yesterday, Broadcom announced a definitive deal to acquire the enterprise business of Symantec for $10.7 security & risk acquisition Broadcom cybersecurity M&A Security & Risk Symantec

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Uncovering The Enterprise Risks Posed By Consumer Connected Devices

Forrester IT

Consumer connected devices are presenting increasingly attractive targets to cybercriminals, putting home networks and potentially enterprise assets at risk. security & risk cybersecurity employee experience IoT mobile Security & Risk

7 Common Mistakes in Enterprise Blockchain Projects

CEB IT

As the technology slides into the Trough of Disillusionment on the Gartner Hype Cycle, it’s vital that CIOs avoid pitfalls that can lead to disappointment and failure in enterprise blockchain projects. Challenges exist in terms of business case viability, governance maturity, technology maturity, availability of skills and even an underlying willingness to alter the way the core enterprise and industry works.”.

Enterprise IoT threatens to undermine cloud and IT security

David Linthicum

Yet most of the Global 2000 companies are unaware of the risks that they are bringing to IT and cloud security with their IoT adoption. The internet of things, or IoT, is pervasive these days in your personal life. However, this technology is just getting into the Global 2000 companies. How did this happen? Well, for example, as thermostats and sensor fail in buildings’ HVAC systems, they are often replaced with smart devices, which can process information at the device.

Enterprise digital transformation leaves data security behind

CTOvision

Read why Charlie Osborne says that implementing modern systems could have a sinister cybersecurity side-effect for enterprises on ZDNet : The rush to embrace new technologies in the name of business modernization, supply chain efficiency, visibility, and cost savings is leading to an increased risk of data compromise, researchers claim.

Enterprises are upping security demands on SME suppliers

Computer Weekly

More and more enterprise-level organisations are assessing cyber security during supplier contract negotiations, a survey shows

Survey 152

Create an Enterprise Architecture to Engage With “Things”

CEB IT

As things become customers, enterprise architects must rethink the notion of what a customer is. As things become customers, enterprise architects must rethink the notion of what a customer is and help radically reshape their organization’s customer service , marketing and sales capabilities accordingly.”. Enterprise architects will need to help sales organizations operate in a world where things will be at least a portion of their customers.

Cisco Acquires Enterprise Security Firm OpenDNS

Data Center Knowledge

Cloud-based security services provider valued at $635 million Read More. Cisco Deals Security

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. Cloud Computing Mobility byod data security mobility

Mobile 243

Five Enterprise Security Threats to Watch Today

IT Toolbox

One of the keynotes at this year’s OracleWorld in San Francisco was about the automated security built into Oracle’s new self-driving database. CEO Larry Ellison made a big deal about the dangers of cyberattack in a world where every part of a business is driven by software, and how the threat is getting beyond what humans can effectively manage. Whether that is

Nonpublic 5G Networks Will Be A Critical Building Block Of Your Enterprise Network Strategy

Forrester IT

Nonpublic 5G networks promise better privacy, data security, compliance, and cellular network performance; they also offer safer and more private features for dedicated user groups.

Enterprise security technology consolidation

Network World

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. And large organizations reacted to these new threats by purchasing and deploying new security controls and monitoring systems. This pattern continued over time, leading to today’s patchwork of security point tools. + Also on Network World: Is your company spending on the right security technologies? +.

Blackberry changes tack to secure enterprise internet of things

Computer Weekly

After dropping devices to concentrate on mobile device management, Blackberry is poised to take on IoT security under John Chen’s leadership

Few iOS apps in enterprises meet Apple’s new security mandate

Computer Weekly

Most iOS apps in the enterprise pose potential security risks, according to research by Appthority

Enterprises Need Plans For Both Climate Sustainability And Adaptation

Forrester IT

risk management security & risk climate change security and riskLast week, more than 11,000 scientists signed their name to a statement declaring a climate emergency and warning of “untold suffering due to the climate crisis.”

Enterprise Security Startup Tanium Gets $90M From Andreessen Horowitz

Data Center Knowledge

Little-known firm that already has some of the world''s largest enterprises as customers draws VC firm''s second-largest investment to date Read More. Enterprise Investing Security

IBM aims at hybrid cloud, enterprise security

Network World

IBM is taking aim at the challenging concept of securely locking-down company applications and data spread across multiple private and public clouds and on-premises locations.

IBM 40

Enterprise IT Security: The Wake-Up Call is Getting Louder

The Investing Edge

I attended two local industry events recently that highlighted the substantial gap that exists between hackers’ abilities and the average corporation’s information security defenses. There are two types of companies,” said Richard Clarke , former security consultant to Presidents Reagan, H.W.

BYOD and its Impact on Enterprise Content Delivery

Kitaboo

Over the last two decades, the way enterprises consume content has changed drastically. Enterprise training is slowly coming out of the traditional classroom model into being a web-based and a mobile-driven training model, where employees can now be trained on any device at any time.

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

When Amy, the CISO of a healthcare provider, looked at cloud security across the enterprise, she realized the default access control models were creating a variety of access issues. BeWell’s infrastructure as a service (IaaS) providers defaulted to a secure state, allowing only the owner access. We’re now being asked how we’re helping the enterprise realize more value while assessing and managing risk, security and even safety. Security

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

Printers: The overlooked security threat in your enterprise | TECHtalk

Network World

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Porup discuss the threats to these devices, plus how to secure them and protect your network

The Three Most Common Myths in Enterprise Security

CTOvision

I’ll say it up front, your security program does not work because it is based on three common myths we hold as unquestionable truths in enterprise security: Myth 1: We can patch our way to security. Myth 1: We can patch our way to security.

More security partitions is always a good idea

David Linthicum

I’m often taken aback by the lack of granularity when it comes to security identity management. For those of you who don’t deal with security operations, or secops, we can create groups using any number of dimensions or domains.

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers

CTOvision

Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. CTO Cyber Security Infrastructure Companies News Security Companies SolarflareResearch Team.

Five Keys for Better Enterprise App Security

IT Toolbox

Enterprise apps are becoming as common among businesses as office desks; roughly 66 percent of companies already are using bespoke enterprise apps for their employees, according to a report by Adobe Systems last year, and nearly 70 percent of companies that have adopted enterprise apps are using between two and

Adobe 100

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. Note that you need to deal with security at the directory level as well, so the directory itself does not become a vulnerability. Security ops. Often overlooked, this is the operational aspect of all of security.

Windows Security Verticals – Digital Security Strategy

Anoop

The focus on Windows security verticals is changing very fast. Traditional security tools might have many challenges with modern technologies based on the cloud. You might need to revamp the digital security strategy. From this post, you will learn high-level details about Microsoft’s digital security strategy. Modern technologies could pose verity of new security challenges […]. Subscribe YouTube Channel [link].

Kaspersky Unveils Private Security Cloud for Enterprises

Data Center Knowledge

Security cloud provides real-time threat updates to customers without sending company data to public cloud Read More. Cloud Computing Security Shared

Six Pre-Requisites for the New Wave of Enterprise IT Security Solutions

The Investing Edge

Given that IT security is a $60 billion market , you might think that we have robust solutions for keeping enterprise networks and data protected. In reality, better than 1 in 5 enterprises —and likely more—has been compromised. Today’s security solutions have not kept the pace.