Inside the Briefcase






Briefcase Highlights


Blogs

Cloud Predictions from Around the Net

February 4, 2015 No Comments

This year promises to be a big one in terms of new and improved cloud services. That’s not just our opinion: It’s also the opinion of those throughout the technology industry. In December, we reached out to nearly 200 bloggers and experts in various technical fields and asked them what they thought 2015 would look like in terms of the cloud.

6 Myths Surrounding Mobile App Development

January 5, 2015 No Comments

If you are a first time mobile app developer, you will be surrounded by myths. Mobile app development, over a period of time has caused a lot of myths that have overridden reality. If statistics are anything to go by, you will see that the percentage of time spent by users on mobile app has gone from 80% to 86% in 2014. Users are demanding mobile apps, as it is convenient to browse an app then opening the website on the mobile.

Blogs, Featured Blogs

IT Pros Speak: Top 3 Priorities for Your IT Security Budget in 2015

December 18, 2014 No Comments

The year is wrapping up quickly (can you believe its mid December?!), meaning we’re all scrambling to finalize budgets and plans for next year. And cyber theft is certainly on our minds with the recent Sony Pictures Entertainment hack and the sheer fallout of confidential data exposure the company is currently experiencing.

Blogs, Featured Blogs

What are Communications Providers focusing on in 2015?

December 17, 2014 No Comments

What do communications providers believe are their biggest challenges to success in 2015? Which technologies do the Telecommunications decision makers cite as making the biggest impact to their business in 2015? CloudSense, the global cloud technology company, have carried out a survey of communication service provider decision-makers across the United States and Europe to find out.

Blogs, Featured Blogs

Total Cost of Ownership: The difference between a consumer tablet versus a rugged tablet

December 11, 2014 No Comments

Xplore Technologies is often asked: what is the difference between a consumer tablet and a fully or ultra-rugged tablet PC? For most, a consumer tablet works best for entertainment and personal use, such as checking emails, browsing the Internet, using web-based applications or viewing streaming media. Rugged tablets, on the other hand, are used primarily in harsh environments that require more durable design and features from a tablet PC, and are used for enterprise mobility initiatives by businesses to outfit field workers and service technicians.

Blogs, Featured Blogs

Why You Need A Third Party Tool for Self-Service Password Reset?

November 20, 2014 No Comments

The default and recommended security policies and compliances have made it mandatory that the password of a user expires after a specific number of days. If the user doesn’t change the password before the expiry, then his/her account will be locked. S/He will not be able to logon at the workstation until the IT helpdesk reset the password.

Blogs, Featured Blogs

Security Intelligence Blog: Cybercriminals Use Citadel to Compromise Password Management and Authentication Solutions

November 20, 2014 No Comments

In these days of endless breaches, securing user access by enforcing unique, complex passwords and strong authentication is imperative. The onslaught of data breaches in the past year alone, with the majority of the breaches involving compromised credentials, forced users to constantly change their passwords. With many users still trying to use the same passwords over and over, and others struggling to remember their newly created complex ones, a password manager becomes a smart and responsible solution for users – and attackers have taken notice.

Blogs, Featured Articles, Featured Blogs

Behold, pathetic mortals, a vampire’s data visualization dashboard

October 28, 2014 No Comments

Greetings, insignificant souls. You may call me … Gregor Castamere. It is not my true name. I stalked this strip of land when it was called New Amsterdam. My family’s name is well known. I have lived for more than 600 years, concealing my terrible secret. I am a vampire.

How Much Did Bellogate Cost?

October 27, 2014 No Comments

By now you’ve probably heard of Bellogate, in which a hacker or imposter sent a University College London (UCL) campus-wide email from what appeared to be the university president’s account. Nearly 29,000 students received an email containing the word “bello.” Then, whether because of the hack or poor email configuration, students were able to reply to the entire list—and they did. Soon each student had thousands of reply-all messages, as well as hundreds of unwanted subscriptions to everything from the Sarah Palin website to One Direction’s fan club.

Blogs, Featured Blogs

8 Android Apps for Wearable Devices

October 20, 2014 No Comments

Android wear entered the market trying the change the whole smart attitude that devices held till then. This renewed affair with smartness that Android wear brought in revolutionized the whole world of technology. While Android brought in revolution, developers are still working on how to bring out the best in Android wear devices.

Blogs, Featured Blogs

A Vision for Converged Backup Infrastructure

October 2, 2014 No Comments

IT is evolving at an accelerated pace today, thanks in large part to virtualization, cloud computing and big data. While these trends can lower costs and increase efficiency, they are too often delivered via point products that offer only marginal improvements to the traditional approach.

Private equity fund managers, do your homework and back a winner

September 24, 2014 No Comments

Private equity funds come in all shapes and sizes. You have funds that invest in entrepreneurial start-ups, you know, the ones whose main asset is just a great idea. And then you have the funds that buy established businesses in more traditional industries (retail, transport, resource, and so on) with the aim of reviving them to their former glory.

Blogs, Featured Blogs

Can IT managers ensure the security of their social software?

August 21, 2014 No Comments

Enterprise social software is high priority for IT departments today, as professionals expect to have access to the best of the consumer tools they use in their personal lives at work. These include social networking, simple file sharing and cloud storage, all available on their mobile devices. However, there is a belief that social tools like these can cause additional security risks, which probably comes from risks associated with public social networking. This concern is well founded as using a public social or file sharing tool like Facebook or Dropbox for business-related communications does cause some unique risks.

Blogs, Featured Blogs

Deconstructing big time data breaches: Where the big boys failed and what your business can learn

August 14, 2014 No Comments

These days, it seems not a day goes by without a data breach story appearing in the news. As these security incidents become more prevalent – not to mention more costly – one of the best things that small businesses can do to prevent them is to learn from others’ mistakes.

IBM X-Force Finds Apache Cordova Vulnerability That Might Expose Nearly 5.8% of Android Apps

August 5, 2014 No Comments

The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova (previously PhoneGap) platform. According to AppBrain, this affects 5.8 percent of Android apps. While 5.8 percent might sound like a low percentage, some widely-used Android applications are built on Cordova. In fact, researchers found that out of the 248 applications tested containing the keyword “bank,” 25 apps were built using Cordova — roughly 10 percent. This means an attacker could steal users’ banking credentials and perform transactions, such as withdrawing or transferring funds from their bank account to another account.

Blogs, Featured Blogs

IT Infrastructure is a Competitive Advantage

July 31, 2014 No Comments

The results are in… I am pleased to announce the new IBM Institute for Business Value global study titled “The IT infrastructure conversation: New content, new participants, new tone”.

Blogs, Featured Blogs

Got WiFi? Free App Helps You Meet Basic User Needs

July 28, 2014 No Comments

Did you hear the one about the teacher who asks a group of students to name something they need but can’t see or feel? The hip-hop loving, smart-gadgets sporting, what’s-apping generation answer in unison, “WiFi.” Increasingly, WiFi is becoming indispensable and, apparently, a candidate for inclusion in Maslow’s hierarchy of basic human needs.

What to do when you rely on Internal Names in TLS/SSL Certificates

July 28, 2014 No Comments

A deadline set by the CA/Browser Forum for the use of Internal Names is quickly approaching, and many system administrators need to understand how best to adapt to this change. At the same time, hundreds of new top-level domains are being launched, which redefines what constitutes an Internal Name. In this post we’ll explain what the changes are, why they’re being made, and how you can update your systems in response to the problem.

LinkedIn: The Secret Menu

July 24, 2014 No Comments

As a Californian and lover of all things In & Out Burger, do you know how pumped I was when I found out that there was a secret menu with things such as Animal Style Fries and Protein Style Burgers. I felt like a kid on Christmas. Fast forward to my life as a professional marketer.

Blogs, Featured Blogs

A Quick Guide to Disaster Recovery in the Cloud

July 22, 2014 No Comments

Create and implement the most effective DR strategy for your organization with the help of Bluelock’s action-packed guide to Disaster Recovery in the cloud. This helpful guide will help you set your DR plan in motion with a comprehensive checklist and detailed information to follow during each step.

Introducing Policy-Based Sync with Storage Sync 10.0

July 16, 2014 No Comments

According to a recent McKinsey , global data is expected to grow by 40 percent per year, with US companies having at least 100 terabytes of stored data and many having more than 1 petabyte. This large amount of data presents a huge challenge for corporate IT to manage and enable access for its employees. Today, we’re happy to announce Storage Sync 10.0 that can solve this major pain point for businesses managing and syncing large amounts of data.

Blogs, Featured Blogs

“Gameover” malware returns from the dead…

July 14, 2014 No Comments

In early June 2014, international law enforcement agencies combined to carry out a hugely successful action called Operation Tovar against the cybercrime group behind the malware family known variously as Gameover, Gameover Zeus or GOZ.

Blogs, Featured Blogs

Security Trust Networks – Developers Welcome

July 7, 2014 No Comments

An associate with the Belfer Center for Science and International Affairs at Harvard’s John F. Kennedy School of Government, Alexander Klimburg has advised the Austrian Institute for International Affairs, the EU, the Organization for Security and Co-operation in Europe, and NATO on issues of international cyber security. In his 2011 “Mobilising Cyber Power,” Klimburg points out that cyber criminals, cyber terrorists, and cyber warriors “share the same social networks and have comparable goals.”

Blogs, Featured Blogs

Mitigate IPO execution risk with cloud collaboration

July 3, 2014 No Comments

One of your biggest clients, United MegaCorp, needs to raise capital. It seems they’ve got into a bit of a pickle and need to start repaying some hefty debt, not to mention getting their hands on some much needed working capital. Having looked at MegaCorp’s business, you come to the overwhelming conclusion that it’s time for the big leagues – it’s time to make an initial public offering (IPO).

Blogs, Featured Blogs

The Data Driven Data Center

July 2, 2014 No Comments

The first generation of Google Wear technology was released last week, bringing with it a new era of interaction, connectedness and in the long run, potential strain on the world’s data centers. As smartphones have become ubiquitous and lost their excitement factor, phone manufacturers are searching for new ways to increase their sales bases. As consumers claw for a simpler, more natural user experience, wearable technology presents one of the largest opportunities.

Blogs, Featured Blogs

The world is flat. Shouldn’t software security be, too?

June 26, 2014 No Comments

Deliberately provoking people is both the upside and the downside of putting a provocative title on the cover of your book. Since its publication in 2005, Thomas L. Friedman’s The World Is Flat has been an international bestseller even as it has provoked some sharp shape-based criticism. One critic (for instance) protests that, no, “The world is spiky” and another that “The world is round.”

Blogs, Featured Blogs

The Farmer, the Cowman, and the Prisoner’s Dilemma

June 18, 2014 No Comments

I’m in Austin. Gave a talk at the ISC2 Secure SDLC event and stuck around to hear a few others, including one that’s got me all wound up. It was delivered by a “security expert” working for one of the big antivirus firms, who had some scary things to say to us in the developer community. Now, when I say “scary,” I don’t mean “sobering” or even “frightening.” Those are grown-up words. “Scary” is what you expect from children and what you use when addressing children. What this speaker had to say was definitely scary. To wit …

Blogs, Featured Blogs

Let’s Talk About the Real Issues in Software Security

June 10, 2014 No Comments

Cross-site scripting (XSS as it has come to be known) can grab session information, account numbers, you name it. But I could also imagine the far greater damage that possible by exploiting a back-end message queue (MQ), something website users never see and know nothing about. I could vividly imagine a developer, with larceny in his heart and nothing in his bank account, using it to make one covert million-dollar transaction after another.

Blogs, Featured Blogs

The top 10 ways to use a secure virtual data room

May 30, 2014 No Comments

Did you think virtual data rooms were just for mergers and acquisitions? Think again. There are many various deals and transactions which virtual data rooms can help you with. Below are our top ten.

Blogs, Featured Blogs

How to Generate Revenues for Businesses Using Mobile Apps?

April 24, 2014 No Comments

The world is connected to the internet at all times! If you see, people are dependent on the way smart phones work, and are mostly addicted to using smart phones. Some of the main reasons for using smart phones apart from communication are knowledge. People seek knowledge on roads, on good restaurants, on top news trending for the hour and other such things.

ADVERTISEMENT

DTX ExCeL London

WomeninTech