"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

ciso

Results 1 - 25 of 117Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Apr 18, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Tenable     Published Date: Nov 06, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, data integration
    
Ounce Labs, an IBM Company
Published By: SAP SME     Published Date: May 09, 2017
Não aconteceu de um dia para o outro, mas aconteceu. A comoditização e a concorrência global aumentaram a pressão em quase todos os setores. Para piorar a situação, os mercados inanceiros tornaram-se mais exigentes do que nas décadas anteriores. Todos procuram o crescimento sustentável, mas poucos encontram a fórmula secreta para o conseguir. O que isso tem a ver com engajamento? Tudo. As empresas otimizaram suas operações para obterem ganhos precisos. Os CEOs estão virando sua atenção para as equipes centradas no cliente – marketing, vendas, comércio e atendimento ao cliente – para atraírem mais clientes e manterem relacionamentos mais profundos com eles. As regras do jogo mudaram.
Tags : 
    
SAP SME
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Oracle     Published Date: Feb 15, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS è molto più facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione è stata più semplice del previsto. È facile prevedere che il quadro sarà sempre più positivo con l’aumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS è molto più facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione è stata più semplice del previsto. È facile prevedere che il quadro sarà sempre più positivo con l’aumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security, security management, security policies
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Secureworks     Published Date: Nov 11, 2016
This paper sets out five major areas of focus for the practical CISO.
Tags : 
managed security services, ciso, security, risk management, security, threat and vulnerability management
    
Secureworks
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Juniper Networks     Published Date: Oct 19, 2015
Datacenters are the factories of the Internet age, just like warehouses, assembly lines, and machine shops were for the industrial age. Over the course of the past several years, riding the wave of modernization, datacenters have become the heart and soul of the financial industry, which each year invests over $480 billion in datacenter infrastructure of hardware, software, networks, and security and services.
Tags : 
juniper, datacenter, threat, ciso, enterprise, data, customer
    
Juniper Networks
Published By: Workday Spain     Published Date: Sep 20, 2018
Hoy en día, la mayoría de las organizaciones carecen de acceso a herramientas de analytics y datos de toda la empresa que puedan utilizar de forma global. Y eso es un problema. Para tomar decisiones empresariales inteligentes y en el momento preciso, su organización debe poder acceder a los datos reales importantes, y debe poder hacerlo rápidamente. Lea el informe de CIO.com para descubrir: • La importancia de tener una fuente única y fiable de información para toda la empresa. • Cómo los sistemas cloud proporcionan datos en lo que puede confiar. • Por qué necesita datos procesables en tiempo real para mejorar la toma de decisiones.
Tags : 
    
Workday Spain
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, authentication, disaster recovery, encryption, wireless security
    
HP - Enterprise
Published By: McAfee     Published Date: Jan 20, 2015
CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, networking
    
McAfee
Start   Previous   1 2 3 4 5    Next    End
Search      

Special Report

What does it take to succeed in today’s hypercompetitive and hyperconnected digital economy? Keep reading to find out.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory