20 Posts

Domenico Raguseo

Technical Sales and Solutions Leader in Europe, IBM Security

Domenico Raguseo is currently Manager of Technical Sales in Europe for the Security Systems Division. He has over 15 years of management experience in different areas. Domenico also cooperates with several Universities by teaching Service Management, Cloud Computing. Since 2010 Domenico is member of Educational Scientific Council for the Master in IT Governance at the University of Rome La Sapienza (http://w3.uniroma1.it/mastersicurezza/index.php/master-itgov/direzione). Domenico got in IBM a certification as IBM Master Inventor for the multiple patents and publications in several disciplines (Business Processes, ROI, Messages and Collaborations, Networking). Finally, he is speaker on Information Security Management, Service Management, Cloud computing, Energy Optimization and Smarter Planet in several national and international events.

Written By Domenico Raguseo

Securing Mobile Transactions and Payments in the Age of Connected Devices

Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.

All Aboard! Applying the Security Immune System Approach to the Railroad Industry

When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.

Increased Awareness Is the Best Cure for Health Care Security Risks

Many health care security risks stem from insufficient leadership and limited resources, which can often be attributed to a lack of security awareness.

Is Your Company Secure by Design? Aligning Security With Business Objectives

The key to aligning security with business objectives is to make assets secure by design, which gives analysts sufficient visibility to respond to threats.

Analyze Attack Patterns to Make Your Environment Secure by Design

By analyzing attack patterns and making their environments secure by design, analysts can control devices remotely without impeding change management.

Viewing Cybersecurity From the Consumer’s Perspective

In today's complex ecosystem of connected devices, cybersecurity is a key consideration for consumers when shopping for products and services.

The Power of the Security Immune System

A security immune system is an integrated set of complimentary controls — not a single solution — working together to protect network data.

Vulnerability Management in the Age of Analytics

An effective vulnerability management strategy requires continuous visibility into endpoint activity and real-time control over devices in a network.

Surfing the Tsunami of Threat Data With Cognitive Security

Nowadays, most organizations' networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.

Lessons Learned From Stuxnet

Today's IT professionals can extract many lessons from the infamous Stuxnet worm, which was discovered in 2010, to help them protect their SCADA systems.

Co-Written By Domenico Raguseo

Data Storage and Encryption Should Top the CISO’s To-Do List

Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.

Securing the Digital Economy With Federated Identity Management

Security professionals must leverage new, risk-based approaches to identity management to keep up with the rapidly expanding digital landscape.

Adopting PaaS: Tips and Best Practices for Cloud Transformation

When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services.

Adopting IaaS: Tips and Best Practices for Cloud Transformation

Many organizations are choosing to adopt cloud and hybrid cloud architectures to integrate with infrastructure-as-a-service (IaaS) solutions.

European Cyber Security Month (ECSM) Promotes IT Security Awareness in the EU

European Cyber Security Month (ECSM) promotes the idea that user awareness, training and readiness are the most effective tools to prevent cyberattacks.

Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud

There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.