Friday, September 25, 2020
Home Interviews

Interviews

MICHAEL SKURLA

How Advancements in IoT Platforms help Industrial Enterprises flourish

  “A real IoT platform is an ecosystem that connects to existing systems and infrastructure already deployed, allowing communication and data aggregation, while also allowing...

Passwordless Authentication Solutions and what works best for Enterprises

  “Enterprises must implement the integration of SSO with a passwordless frontend that incorporates a full three-factor authentication. It is the correct combination of secure...
CHRIS HICKMAN

The Growing Need for Certificate Lifecycle Management

  “Achieving full maturity within the model leads to a fully automated, centralized approach to replacing expiring certificates and depreciation management. CISOs working toward maturity...

Enterprise Bot Security is Essential Especially amid COVID-19

Blocking all bots is a bad idea, it’s far better to figure out who wants to do harm and keep them off your site,...
Analytics Instamojo

Convenient Digital Transactions Surpass the Fear of Fraud Amongst Consumers

“The convenience provided by digital transactions far surpasses the fear of fraud among the consumers,” says Ankur Sharma, VP Analytics, Instamojo, in an exclusive...
fraud.net

Friendly Frauds – Beware of Customers

“Analysts estimate that this type of fraud will cost online businesses as much as $50 billion in 2020,” says Whitney Anderson, CEO, and Co-founder,...
JOE SKOCICH

Escalating Security Concerns in the Post-COVID World

“My hope is that it will light a fire under companies to prioritize security measures like never before,” says Joe Skocich, VP, Global Sales...
Cyber Crime, Cyber Criminal, Cyber Attacker, Cyber Criminals, Access Management Solutions, Data Protection, Endpoint Security, COVID-19 Remote Working, Work from Home, Coronavirus, IT, Cyber Hackers, WALLIX, Endpoint Privilege Management (EPM), Privileged Access Management, PAM, Data Security, CEO, CTO, CISO, Cyber Crime, Cyber Criminal, Cyber Attacker, Cyber Criminals, Access Management Solutions, Data Protection, Endpoint Security, COVID-19 Remote Working, Work from Home, Coronavirus

Securing Enterprise Systems is More Critical than Ever During COVID-19

" Knowledge is power. Knowing exactly who has access to which systems, when, and what they are doing with that access empowers businesses to...
Privacy Compliances, Gartner, smartphones, currency bank account, Simona Rollinson, CTO, ISACA, Enterprise Risk Management, GDPR and CCPA, Data privacy, compliance programs, security management CEO, CTO

Ensuring Privacy Compliances Needs To Be Meaningful, Not Just Cosmetic

“Gartner predicts that by 2025, 50% of people with a smartphone but without a bank account will be using mobile access to a currency...
cyber security, cyber-attacks, cyber criminals, Mission Secure, Control systems and OT (operational technology) networks, technology, Maritime industry, control system, International Maritime Organization, global cyber alliances, ISA cyber security alliance, US, Switzerland, Israel, Netherlands, OT professionals, IP addresses, backup procedures, communicating CTO, CEO, cyber security, cyber-attacks, cyber criminals, Mission Secure, Control systems and OT (operational technology) networks,

Cyber Security in the Industrial Control System in 2020 and Beyond

The threat landscape due to the geopolitical situation around the world is also creating adversaries that have an understanding of OT systems and targets...

Latest posts