25 Posts

Domenico Raguseo

Technical Sales and Solutions Leader in Europe, IBM Security

Domenico Raguseo is currently Manager of Technical Sales in Europe for the Security Systems Division. He has over 15 years of management experience in different areas. Domenico also cooperates with several Universities by teaching Service Management, Cloud Computing. Since 2010 Domenico is member of Educational Scientific Council for the Master in IT Governance at the University of Rome La Sapienza (http://w3.uniroma1.it/mastersicurezza/index.php/master-itgov/direzione). Domenico got in IBM a certification as IBM Master Inventor for the multiple patents and publications in several disciplines (Business Processes, ROI, Messages and Collaborations, Networking). Finally, he is speaker on Information Security Management, Service Management, Cloud computing, Energy Optimization and Smarter Planet in several national and international events.

Written By Domenico Raguseo

How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.

Best Practices for Designing a Security Operations Center

Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.

A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity

Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.

What to Do When a Memory Corruption on an Input String Generates a DoS

When a special char in an application running on a common operating system generates a memory corruption issue, a holistic security immune system is the key to minimizing the impact of a DoS event.

Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions

New security standards around open banking focus on multifactor authentication and monitoring of transactions but largely ignore device security.

Securing Mobile Transactions and Payments in the Age of Connected Devices

Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.

All Aboard! Applying the Security Immune System Approach to the Railroad Industry

When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.

Increased Awareness Is the Best Cure for Health Care Security Risks

Many health care security risks stem from insufficient leadership and limited resources, which can often be attributed to a lack of security awareness.

Is Your Company Secure by Design? Aligning Security With Business Objectives

The key to aligning security with business objectives is to make assets secure by design, which gives analysts sufficient visibility to respond to threats.

Analyze Attack Patterns to Make Your Environment Secure by Design

By analyzing attack patterns and making their environments secure by design, analysts can control devices remotely without impeding change management.

Co-Written By Domenico Raguseo

Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data.

Data Storage and Encryption Should Top the CISO’s To-Do List

Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.

Securing the Digital Economy With Federated Identity Management

Security professionals must leverage new, risk-based approaches to identity management to keep up with the rapidly expanding digital landscape.

Adopting PaaS: Tips and Best Practices for Cloud Transformation

When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services.

Adopting IaaS: Tips and Best Practices for Cloud Transformation

Many organizations are choosing to adopt cloud and hybrid cloud architectures to integrate with infrastructure-as-a-service (IaaS) solutions.

European Cyber Security Month (ECSM) Promotes IT Security Awareness in the EU

European Cyber Security Month (ECSM) promotes the idea that user awareness, training and readiness are the most effective tools to prevent cyberattacks.

Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud

There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.