28 Posts

Domenico Raguseo

Technical Sales and Solutions Leader in Europe, IBM Security

Domenico Raguseo is currently Manager of Technical Sales in Europe for the Security Systems Division. He has over 15 years of management experience in different areas. Domenico also cooperates with several Universities by teaching Service Management, Cloud Computing. Since 2010 Domenico is member of Educational Scientific Council for the Master in IT Governance at the University of Rome La Sapienza (http://w3.uniroma1.it/mastersicurezza/index.php/master-itgov/direzione). Domenico got in IBM a certification as IBM Master Inventor for the multiple patents and publications in several disciplines (Business Processes, ROI, Messages and Collaborations, Networking). Finally, he is speaker on Information Security Management, Service Management, Cloud computing, Energy Optimization and Smarter Planet in several national and international events.

Written By Domenico Raguseo

Adopting SaaS: Tips and Best Practices for Cloud Transformation

Despite its many cost and efficiency benefits, adopting SaaS can introduce new security issues if not managed and tested according to best practices.

2016: The Year of the DDoS Attack

In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.

Cloud: To Adopt or Not to Adopt?

Cloud adoption can help optimize costs, but it also imposes constraints due to local and global regulations, and introduces security concerns.

Is Security Just About Culture?

Instilling a culture of strong security practices and security awareness means making sure you have the technologies in place to support those efforts.

Security by Design: How to Integrate Security Needs Within the Change Management Process

The right change management framework uses different elements to understand how an enterprise must react to an event in order to survive and thrive.

Zero-Day Vulnerabilities Matter, but Don’t Ignore Known Issues

Organizations funnel a lot of resources into defending against zero-day vulnerabilities, but these are not the only concerns they should pay attention to.

Should the Energy Production Industry Consider Cybersecurity?

When it comes to keeping energy production plants safe, there must be a stronger focus on cybersecurity in light of new, sophisticated attacks.

Cloud Adoption Can Boost Security for an SMB

A small or midsize business (SMB) can benefit from adopting the cloud because of its increased security level and lower costs.

Co-Written By Domenico Raguseo

Why You Should Start Leveraging Network Flow Data Before the Next Big Breach

One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.

Can a Cognitive-Powered Security Intelligence Platform Bring Your SOC Up to Speed?

Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data.

Data Storage and Encryption Should Top the CISO’s To-Do List

Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.

Securing the Digital Economy With Federated Identity Management

Security professionals must leverage new, risk-based approaches to identity management to keep up with the rapidly expanding digital landscape.

Adopting PaaS: Tips and Best Practices for Cloud Transformation

When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services.

Adopting IaaS: Tips and Best Practices for Cloud Transformation

Many organizations are choosing to adopt cloud and hybrid cloud architectures to integrate with infrastructure-as-a-service (IaaS) solutions.

European Cyber Security Month (ECSM) Promotes IT Security Awareness in the EU

European Cyber Security Month (ECSM) promotes the idea that user awareness, training and readiness are the most effective tools to prevent cyberattacks.

Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud

There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.