| | AUGUST 20176CIOReviewMuch has been spoken about the recent WannaCry fiasco. Schools, hospitals, and even some federal institutions fell victim to the massive ransomware attack that spread across 150 countries. The incident was a wake-up call for many businesses around the world; enterprises have come to learn that no matter how safe they think their security strategies are, vulnerabilities come in a variety of ways. For many, the importance of keeping enterprise software up to date has propelled the trend of automated patch management.Tools for automated patch management are gaining mainstream attraction, and more small players are entering the scene breaking the hurdles of affordability. Community-aided open source forums help the case, as the software developed by these parties are resilient, making updates almost immediately available after an attack, and is supported by an army of active programmers.What can help the situation better is a more proactive approach to enterprise security itself. Removing the human element of procrastination and ignorance will make the approaches infallible. "Threat hunting" is the new buzzword that has caught the attention of vendors and buyers alike in this space. Experts believe that 2017 will be the year for "hunt analysis," where machine learning, cognitive technology, and AI together will put defenders a step ahead of cybercrime perpetrators.By 2020, one million new devices will go online every hour, as predicted by IDC; this means thousands of equipment manufacturers and hundreds of firmware being added to the widely distributed network spectrum on a day-to-day basis. To keep the risk of exposure to the increasing surface area in check, OEMs of IoT devices will have to make their devices more easily deployable by embedding security during production to enable integrated "layered defense."Along with the hardware manufacturers, several solution providers are paving the leeway for businesses to fit a robust enterprise security strategy into their organizational value chain and procure a return on their investments. In an effort to make the workday of a CISO easier, CIOReview is presenting an edition of enterprise security. In this edition, we present you a curated list of enterprise security solution providers along with insights from thought leaders in the industry.We hope this edition will add value to your business strategies. Let us know your thoughts!Jeevan George Managing Editoreditor@cioreview.comEditorialReady, Aim, HuntCopyright © 2017 ValleyMedia, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.CIOReviewAUGUST - 04 - 2017Mailing AddressCIOReview44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.402.1463, F:510-894-8405 AUGUST - 04 - 2017, Vol 06 SE 81 Published by ValleyMedia, Inc.To subscribe to CIOReviewVisit www.cioreview.com CIOReviewEditorial StaffSalesT:510.565.7628 Aaron PierceCarolynn WaltersJustin SmithKaruna GautamKenneth ThomasKyle SummersRussell ThomasSarah FernandesLawrence Tselawrence@cioreview.comVisualizersAsher BlakeJohn GouthamManaging EditorJeevan GeorgeENTERPRISE SECURITY SPECIAL*Some of the Insights are based on the interviews with respective CIOs and CXOs to our editorial staff
<
Page 5 |
Page 7 >