Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Is your enterprise software committing security malpractice?

Network World

Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user.

Broadcom Buys Symantec’s Enterprise Biz.: Good News For Investors; Bad News For Enterprises

Forrester IT

Yesterday, Broadcom announced a definitive deal to acquire the enterprise business of Symantec for $10.7 security & risk acquisition Broadcom cybersecurity M&A Security & Risk Symantec

7 Common Mistakes in Enterprise Blockchain Projects

CEB IT

As the technology slides into the Trough of Disillusionment on the Gartner Hype Cycle, it’s vital that CIOs avoid pitfalls that can lead to disappointment and failure in enterprise blockchain projects. Challenges exist in terms of business case viability, governance maturity, technology maturity, availability of skills and even an underlying willingness to alter the way the core enterprise and industry works.”.

Enterprise Cloud Security Startup Skyhigh Raises $40M

Data Center Knowledge

Cloud Computing Enterprise Investing SecurityShare price indicates a down round, but CEO begs to differ Read More.

Uncovering The Enterprise Risks Posed By Consumer Connected Devices

Forrester IT

Consumer connected devices are presenting increasingly attractive targets to cybercriminals, putting home networks and potentially enterprise assets at risk. security & risk cybersecurity employee experience IoT mobile Security & Risk

Enterprises are upping security demands on SME suppliers

Computer Weekly

More and more enterprise-level organisations are assessing cyber security during supplier contract negotiations, a survey shows

Survey 152

Five Enterprise Security Threats to Watch Today

IT Toolbox

One of the keynotes at this year’s OracleWorld in San Francisco was about the automated security built into Oracle’s new self-driving database. CEO Larry Ellison made a big deal about the dangers of cyberattack in a world where every part of a business is driven by software, and how the threat is getting beyond what humans can effectively manage. Whether that is

Cisco Acquires Enterprise Security Firm OpenDNS

Data Center Knowledge

Cloud-based security services provider valued at $635 million Read More. Cisco Deals Security

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. Cloud Computing Mobility byod data security mobility

Mobile 243

Create an Enterprise Architecture to Engage With “Things”

CEB IT

As things become customers, enterprise architects must rethink the notion of what a customer is. As things become customers, enterprise architects must rethink the notion of what a customer is and help radically reshape their organization’s customer service , marketing and sales capabilities accordingly.”. Enterprise architects will need to help sales organizations operate in a world where things will be at least a portion of their customers.

Blackberry changes tack to secure enterprise internet of things

Computer Weekly

After dropping devices to concentrate on mobile device management, Blackberry is poised to take on IoT security under John Chen’s leadership

Few iOS apps in enterprises meet Apple’s new security mandate

Computer Weekly

Most iOS apps in the enterprise pose potential security risks, according to research by Appthority

BYOD and its Impact on Enterprise Content Delivery

Kitaboo

Over the last two decades, the way enterprises consume content has changed drastically. Enterprise training is slowly coming out of the traditional classroom model into being a web-based and a mobile-driven training model, where employees can now be trained on any device at any time.

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

When Amy, the CISO of a healthcare provider, looked at cloud security across the enterprise, she realized the default access control models were creating a variety of access issues. BeWell’s infrastructure as a service (IaaS) providers defaulted to a secure state, allowing only the owner access. We’re now being asked how we’re helping the enterprise realize more value while assessing and managing risk, security and even safety. Security

Enterprise Security Startup Tanium Gets $90M From Andreessen Horowitz

Data Center Knowledge

Little-known firm that already has some of the world''s largest enterprises as customers draws VC firm''s second-largest investment to date Read More. Enterprise Investing Security

Enterprise security technology consolidation

Network World

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. And large organizations reacted to these new threats by purchasing and deploying new security controls and monitoring systems. This pattern continued over time, leading to today’s patchwork of security point tools. + Also on Network World: Is your company spending on the right security technologies? +.

Fugue: Autonomous Cloud Security and Compliance

CTOvision

Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Enterprise IT Security: The Wake-Up Call is Getting Louder

The Investing Edge

I attended two local industry events recently that highlighted the substantial gap that exists between hackers’ abilities and the average corporation’s information security defenses. There are two types of companies,” said Richard Clarke , former security consultant to Presidents Reagan, H.W.

Five Keys for Better Enterprise App Security

IT Toolbox

Enterprise apps are becoming as common among businesses as office desks; roughly 66 percent of companies already are using bespoke enterprise apps for their employees, according to a report by Adobe Systems last year, and nearly 70 percent of companies that have adopted enterprise apps are using between two and

Adobe 100

The Three Most Common Myths in Enterprise Security

CTOvision

I’ll say it up front, your security program does not work because it is based on three common myths we hold as unquestionable truths in enterprise security: Myth 1: We can patch our way to security. Myth 1: We can patch our way to security.

More reasons to put secure data in the public cloud

David Linthicum

This should surprise no one, considering the amount of core business assets that are being pushed to the cloud now, as well as the amount that security providers are spending on cloud. IDG Research: The state of the cloud: How enterprise adoption is taking shape.

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers

CTOvision

Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. CTO Cyber Security Infrastructure Companies News Security Companies SolarflareResearch Team.

Enterprise IoT threatens to undermine cloud and IT security

David Linthicum

Yet most of the Global 2000 companies are unaware of the risks that they are bringing to IT and cloud security with their IoT adoption. The internet of things, or IoT, is pervasive these days in your personal life. However, this technology is just getting into the Global 2000 companies. How did this happen? Well, for example, as thermostats and sensor fail in buildings’ HVAC systems, they are often replaced with smart devices, which can process information at the device.

Kaspersky Unveils Private Security Cloud for Enterprises

Data Center Knowledge

Security cloud provides real-time threat updates to customers without sending company data to public cloud Read More. Cloud Computing Security Shared

Secure Enclaves: Foundation For The Cloud-Based Enterprise

CTOvision

This is the first in a series of blog posts examining a cloud-based enterprise. In this post we’ll introduce how a Secure Enclave can help enterprises migrate to a cloud-based model. The two dominant themes in enterprise architecture today is the desire to save money by utilizing cloud services and threat of state-sponsored cyberattacks. Cloud Computing CTO Cyber Security News AWS information technology public clouds

Six Pre-Requisites for the New Wave of Enterprise IT Security Solutions

The Investing Edge

Given that IT security is a $60 billion market , you might think that we have robust solutions for keeping enterprise networks and data protected. In reality, better than 1 in 5 enterprises —and likely more—has been compromised. Today’s security solutions have not kept the pace.

Six Enterprise Security Risks from Wearables

IT Toolbox

It is no surprise, therefore, that wearables security is a going concern for enterpriseThis year an estimated 274.6 million wearable electronic devices will be sold worldwide, according to Gartner research. By next year, 30 percent of these wearables will be of the kind that is invisible to the naked eye.

Tapping Global Threat Intelligence To Secure Enterprise Networks

CTOvision

On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. Discussions began with a question to the panel addressing the biggest threat to the United States’ national security.

Cybersecurity through enterprise risk management

Cloud Musings

The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in cybersecurity or a failure to properly invest in people, security training or technology. Kevin: The whole idea of security encompasses so many facets.

Study: Most enterprise IoT transactions are unencrypted

Network World

Of the millions of enterprise- IoT transactions examined in a recent study, the vast majority were sent without benefit of encryption, leaving the data vulnerable to theft and tampering. The research by cloud-based security provider Zscaler found that about 91.5

Study 114

Why enterprises are finally paying up for big data security

Tech Republic Big Data

Companies like Cloudera and Hortonworks are cashing in as enterprises finally get serious about securing big data

HPE’s Gen10 Servers Will Have Security Drilled into Silicon

Data Center Knowledge

The company's custom silicon enables security at the firmware level. Design Hardware Hewlett Packard Enterprise SecurityRead More.

Young Turks in the Enterprise

The Investing Edge

Ascent strives to anticipate long term technology trends within the enterprise, so it’s worth commenting how these collegians’ slightly older peers have redefined enterprise IT. Many enterprises now enable employees to use their own computers and smartphones.