28 Posts

Domenico Raguseo

Technical Sales and Solutions Leader in Europe, IBM Security

Domenico Raguseo is currently Manager of Technical Sales in Europe for the Security Systems Division. He has over 15 years of management experience in different areas. Domenico also cooperates with several Universities by teaching Service Management, Cloud Computing. Since 2010 Domenico is member of Educational Scientific Council for the Master in IT Governance at the University of Rome La Sapienza (http://w3.uniroma1.it/mastersicurezza/index.php/master-itgov/direzione). Domenico got in IBM a certification as IBM Master Inventor for the multiple patents and publications in several disciplines (Business Processes, ROI, Messages and Collaborations, Networking). Finally, he is speaker on Information Security Management, Service Management, Cloud computing, Energy Optimization and Smarter Planet in several national and international events.

Written By Domenico Raguseo

Here’s What You Need to Know to Secure Your IoT Projects

Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.

Make Smarter Decisions With Intelligent Access Certification

Intelligent access certification helps security teams improve visibility into access, prioritize compliance tasks with risk-based insights and make better decisions with actionable intelligence.

Insights From European Customers on Cybersecurity and Security Awareness

Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and more.

Here’s How the University of Bari Is Tackling the Cybersecurity Skills Shortage

With support from IBM, the University of Bari Aldo Moro in Italy is developing a curriculum to help students develop the cybersecurity skills they need to work in a security operations center (SOC).

How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.

Best Practices for Designing a Security Operations Center

Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.

A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity

Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.

What to Do When a Memory Corruption on an Input String Generates a DoS

When a special char in an application running on a common operating system generates a memory corruption issue, a holistic security immune system is the key to minimizing the impact of a DoS event.

Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions

New security standards around open banking focus on multifactor authentication and monitoring of transactions but largely ignore device security.

Securing Mobile Transactions and Payments in the Age of Connected Devices

Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.

Co-Written By Domenico Raguseo

Why You Should Start Leveraging Network Flow Data Before the Next Big Breach

One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.

Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data.

Data Storage and Encryption Should Top the CISO’s To-Do List

Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.

Securing the Digital Economy With Federated Identity Management

Security professionals must leverage new, risk-based approaches to identity management to keep up with the rapidly expanding digital landscape.

Adopting PaaS: Tips and Best Practices for Cloud Transformation

When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services.

Adopting IaaS: Tips and Best Practices for Cloud Transformation

Many organizations are choosing to adopt cloud and hybrid cloud architectures to integrate with infrastructure-as-a-service (IaaS) solutions.

European Cyber Security Month (ECSM) Promotes IT Security Awareness in the EU

European Cyber Security Month (ECSM) promotes the idea that user awareness, training and readiness are the most effective tools to prevent cyberattacks.

Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud

There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.