Website security for small businesses can be just as important as it is for the big players.  However, misinformation regarding what steps can be taken to mitigate risk often means that many small businesses which depend on their website for direct sales or lead generation are at significant risk.  According to Tony Perez, CEO of...
Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some level of protection – both device and network-based. But, how do we deal with unknown threats? How do we discover critical data that we don’t even know that we don’t know...
Just like a well-thought-out business plan, building and maintaining an effective cyber security policy and apparatus is a key component of any business today.  Yet many businesses are unaware of the danger and the reality of the adage: “it isn’t a question of if, but when.”  Craig McDonald, CEO of MailGuard, is working not only...
Controlling access to applications and an organization’s data stored within  is critical as data becomes more important and valuable as a resource. While many solutions exist to secure data, they often rely only on user roles and passwords to enable access. Niklas Jakobsson, CEO of Axiomatics, discusses why dynamic authorization, which places access requests within...
In the past, IT management was a space dominated by expensive, cumbersome and complicated technologies that were only accessible to very large companies.  Raj Sabhlok, President of ManageEngine, talks about the development of easy-to-use IT management technologies for small and medium-sized businesses in an increasingly technological business environment. Tell us about ManageEngine, the history of...
Businesses aren’t the only entities that need excellent digital and secure solutions.  Jon Hammock, President and CEO of KeyLogic, discusses the challenges and rewards related to working to make the U.S. government, one of the world’s largest customers, digital and secure. Tell us about KeyLogic, the history of the company and what it does. KeyLogic has...
As privacy concerns grow, consumers are looking for solutions to keep their internet use private, secure, and unrestricted.  Virtual Private Networks (VPNs) provide an ideal solution but not all are created equal. Jeremy Palmer, Vice President of IPVanish, discusses VPN’s, user security, and why people need to know that if they aren’t the customer, they...
With data security regulations becoming increasingly critical – especially with the upcoming General Data Protection Regulation (GDPR) – organizations and companies need solutions that can ensure compliance across their systems in order to function optimally.  Kishor Vaswani, CEO of ControlCase, discusses what modern compliance is about and why automation is the only way forward. Tell...
Getting the top-level security is a must for many organizations in an increasingly complicated cyberworld.  Using experience garnered from military-grade security solutions in the Australian Department of Defense, Covata has created unique solutions to deal with the myriad threats in play.  Mike Fleck, Covata’s VP Security, talks about cybersecurity concerns of small businesses and today’s...
Data is key to providing modern and complex problems and providing services in a timely fashion.  However, data is often stored or accessed in ways that are single-use and are difficult to extract.  Peter L. Levin, Co-founder and CEO of Amida, believes that by focusing on the upstream sources of data, data management, interoperability and...