ciso

Results 1 - 25 of 158Sort Results By: Published Date | Title | Company Name
Published By: Secure Code Warrior     Published Date: Mar 10, 2020
As more businesses move to agile methodologies, providing more online services to customers and exposing data and APIs, the need for “Shifting Left” and building security into the start of the (continuous) development cycle grows every day. CIOs and CISOs need to think carefully about when, where and how to deploy a security uplift program to maximize business impact and not overload the core function of the developers. In this e-book , we share six steps companies should take before deploying a program, based on our learnings from more than fifty enterprise deployments. These steps will help you get he strategy, data and processes in place to drive success. Download this report now.
Tags : 
    
Secure Code Warrior
Published By: Zscaler     Published Date: Mar 24, 2020
La tecnologia è stata a lungo considerata il motore necessario per mantenere operativa l’azienda. Oggi, ne viene riconosciuto il ruolo di vero e proprio motore economico, in grado di creare nuove efficienze, capacità ed opportunità che prima erano fuori dalla portata per la maggior parte delle imprese. Il ruolo del responsabile IT si è evoluto in modo similare, laddove CISO, CIO e CTO sono ora parte dell’esecutivo aziendale, data una nuova focalizzazione strategica sulla tecnologia. I principali fattori di questo cambiamento sono riconducibili all’esplosione nell’adozione del cloud pubblico in azienda, inclusi Azure e AWS, e l’uso diffuso di dispositivi portatili di proprietà dei dipendenti per lavoro. Le aziende sfruttano queste tecnologie per ottimizzare i processi aziendali e fornire prodotti e servizi più rapidamente, con un costo complessivo inferiore. Ma che dire del fattore di rischio che introducono in azienda? Dato questo spostamento verso cloud e mobilità, il tradizionale pe
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Mar 24, 2020
Aunque hace mucho que se considera que la tecnología es un motor necesario para que siga evolucionando la empresa, ahora es reconocida como verdadero impulsor de negocio, capaz de crear nuevas eficiencias, capacidades y oportunidades que antes no estaban al alcance de la mayoría de las empresas. El papel del director de TI ha evolucionado de una manera similar. Así, los CISOs, CIOs y CTOs ya forman parte de la cúpula directiva gracias al nuevo enfoque estratégico de la tecnología. Los principales factores de este cambio han sido la explosión de la adopción de la nube pública empresarial, incluyendo Azure y AWS, y el amplio uso de dispositivos móviles pertenecientes a empleados para trabajar (BYOD). Las empresas están aprovechando dichas tecnologías para optimizar los procesos empresariales y ofrecer productos y servicios más rápidamente y a menor coste global. ¿Pero, qué riesgo entrañan? Debido al auge de la nube y de la movilidad, el perímetro de seguridad tradicional que antes proteg
Tags : 
    
Zscaler
Published By: BeyondTrust     Published Date: Apr 03, 2020
With the rapid development of the Coronavirus (COVID-19), many security professionals have begun exploring their disaster recovery (DR) plans to allow remote work en masse. The goals: keep the organization productive during this crisis and ensure that any unacceptable security risks are not created in the process. While most DR plans focus on maintaining productivity in the face of a single catastrophic event, Coronavirus represents a long-term threat that might stretch the typical disaster recovery model to its brink of coverage. Join Morey Haber, CISO of BeyondTrust and author of three cybersecurity books, in this on-demand webinar for practical guidance on how to quickly implement and scale strong security protocols to enable long-term remote work. He will also cover: • Sensitive data and data privacy • Shadow IT and free, or consumer-grade, tools • Bring your own device (BYOD) • Secure remote access – the foundation for effective remote working
Tags : 
    
BeyondTrust
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: SAP SME     Published Date: May 09, 2017
Não aconteceu de um dia para o outro, mas aconteceu. A comoditização e a concorrência global aumentaram a pressão em quase todos os setores. Para piorar a situação, os mercados inanceiros tornaram-se mais exigentes do que nas décadas anteriores. Todos procuram o crescimento sustentável, mas poucos encontram a fórmula secreta para o conseguir. O que isso tem a ver com engajamento? Tudo. As empresas otimizaram suas operações para obterem ganhos precisos. Os CEOs estão virando sua atenção para as equipes centradas no cliente – marketing, vendas, comércio e atendimento ao cliente – para atraírem mais clientes e manterem relacionamentos mais profundos com eles. As regras do jogo mudaram.
Tags : 
    
SAP SME
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
Published By: MalwareBytes EMEA     Published Date: Nov 20, 2019
At the heart of every organization are its employees, the engine that drives growth, fueled by the data they create and store on their laptops, tablets, and mobile phones, as well as access through data center and cloud servers. The job of every CISO is to secure the organization and minimize risk to business...
Tags : 
resilience, cloud servers, minimize risk
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Nov 20, 2019
Das Fundament jeder Organisation sind deren Mitarbeiter – sie sind der Motor für Wachstum, der von den Daten betrieben wird, die sie auf ihren Laptops, Tablets und Mobiltelefonen erstellen und speichern und auf die sie über Datenzentren und Cloudserver zugreifen. Die Aufgabe jedes CISO ist der Schutz...
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Nov 21, 2019
Das Fundament jeder Organisation sind deren Mitarbeiter – sie sind der Motor für Wachstum, der von den Daten betrieben wird, die sie auf ihren Laptops, Tablets und Mobiltelefonen erstellen und speichern und auf die sie über Datenzentren und Cloudserver zugreifen. Die Aufgabe jedes CISO ist der Schutz...
Tags : 
cyber-widerstandsfähigkeit, cloudserver zugreifen
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
Advances in healthcare technologies have made patient records portable, transferable, alterable, and destructible—for both good and bad actors. The unfortunate truth is that BYOD, the boom of mHealth apps, the cloud, and the lack of awareness among staff have made healthcare cybersecurity more challenging than ever. While the interconnectedness of devices and systems promises to improve operational efficiency and patient care, it also opens the door to cybercriminals armed with sophisticated cyberweapons. The good news is that CISOs, managers, and IT specialists can start addressing these challenges today. This eBook uncovers how each role can reduce risk and increase awareness throughout the organization. And if you fill one of these vital roles, this information is invaluable.
Tags : 
    
MalwareBytes EMEA
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Akamai Technologies     Published Date: Sep 04, 2019
It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, there’s no longer a choice. As a CIO, CISO, or other security or IT leader, you know it’s your job to be the central agent stressing the connections between business and digital risk. It’s your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That’s up from 40% in 2018. Whether you’r
Tags : 
    
Akamai Technologies
Published By: Oracle     Published Date: Feb 15, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS è molto più facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione è stata più semplice del previsto. È facile prevedere che il quadro sarà sempre più positivo con l’aumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS è molto più facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione è stata più semplice del previsto. È facile prevedere che il quadro sarà sempre più positivo con l’aumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Secureworks     Published Date: Nov 11, 2016
This paper sets out five major areas of focus for the practical CISO.
Tags : 
managed security services, ciso, security, risk management, security, threat and vulnerability management
    
Secureworks
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.