Inside the Briefcase


IT Briefcase Exclusive Interview: Getting the Most Out of Open Source While Managing License Compliance, Risk, and Security

IT Briefcase Exclusive Interview: Getting the Most Out of Open Source While Managing License Compliance, Risk, and Security

with Kendra Morton, Flexera
In this interview, Kendra Morton, product marking manager at Flexera, discusses Software Composition Analysis (SCA) trends including leading Flexera’s annual State of Open Source License Compliance report. Read More >>>

Why DEM Matters More Than Ever in Financial Services

Why DEM Matters More Than Ever in Financial Services

Remember waiting in line at the bank? Banking customers are doing a lot less of that in the digital era, which has revolutionized the way financial services function. Live tellers and bankers have been replaced by online transactions and...





Briefcase Highlights


DATA SECURITY

How Secure is Your Access Control System?

June 8, 2020 No Comments

Ensuring employee protection and safety is an increasing concern for companies and businesses across the U.S. Due to Covid-19, safety and security requirements, including recommended CDC guidelines, are changing all the time. As many companies prepare to return to work, it’s more critical than ever to create secure and safe spaces and that begins with access control. From mitigating burglary and theft to ensuring hygienic protocols are in place, company owners are realizing the growing need for a safe and secure access control system.

Do you really need to build that iPhone app?

June 1, 2020 No Comments

Many of us use mobile apps every day. In fact, in 2019, according to App Annie’s latest State of Mobile report, there were 204 billion downloads from app stores worldwide. It’s not surprising then, that businesses typically approach app developers asking for an iPhone app (and an Android app if there’s budget). But there’s a third option. And if you’re a small business or start-up, the money and time saved could be the difference between building your app … or not.

Trolling Elections: How Fake Accounts Actually Work

May 26, 2020 No Comments

Ever since the 2016 presidential elections, and the subsequent revelations of foreign interference, the issue of bots and trolls on social media platforms has been thrust into the mainstream. There is now a general awareness of the issue of fake accounts on social media, and the potential consequences of allowing those accounts to run rampantly unchecked. However, despite this awareness, fake accounts continue to plague social media websites.

How to Increase the Security of Your Cloud Server in 5 Steps

May 25, 2020 No Comments

If you are having a bit of hesitation about whether or not to add cloud computing services to your IT infrastructure, then you need to know that it’s normal for you to be cautious. When it comes to cloud services, data security is a big source of concern for IT professionals. With an increasing number of companies moving their data and applications to the cloud, company executives are left with the job of striking a balance between the benefits of an increase in productivity and worries about IT security and compliance.

Things to Consider When Choosing an SQL Server

May 19, 2020 No Comments

Most enterprises that do business online use databases to store information. In turn, these databases require servers, such as SQL servers. When so many resources and records depend on a single piece of hardware, choosing an SQL server is no small feat. The wrong SQL server can result in countless hours wasted, waiting for database requests to go through.

How to Protect Employees and Data with Remote Email Security Tools

May 12, 2020 No Comments

Stay-at-home measures taken in the wake of the novel coronavirus pandemic are opening more doors for cybercriminals. As the number of remote employees has climbed so have criminal attempts to access email. Companies are at risk unless they adopt email security tools, which slam the door shut on cybercriminals.

What Is Data Protection and Why Is It Important?

May 11, 2020 No Comments

It may sound self-explanatory, but data protection involves a lot more than just using passwords to protect your account and keeping your laptop and external hard drive safe. Today, we’re constantly connected to the internet, with our active and inactive accounts strewn all over the internet – this makes us vulnerable.

How To Monitor and Secure Your Employees’ Internet Activity

May 5, 2020 No Comments

Whether your employees work from home or in an office, overseeing your staff’s internet usage is crucial. How do they spend their time online during work hours? All businesses want to make sure their employees are conducting themselves online in a professional manner and are completing their work tasks. Plus, there are many threats on the internet such as hackers that could compromise the entire business. These are just some of the key reasons why companies should monitor and secure their employees’ internet activity.

High-Tech Security Tools Keeping Businesses Safe

April 14, 2020 No Comments

Among the many technology trends impacting businesses in recent years have been the emergence of various high tech security tools. These tools have emerged to address the growing number of cybersecurity threats facing businesses these days. There are a range of risks and threats in the physical world, too, but luckily there are high-tech solutions to these too.

Why Cybersecurity is Important for Your Business

April 3, 2020 No Comments

Cybersecurity refers to the measures taken by an organization to protect its information systems from theft and damage. The frequency and success rate of cyberattacks carried out on businesses continues to increase, thanks in no small part to their growing digital presence. A single incident can have devastating financial, reputational, and legal implications.

The risks and rewards of Workplace Messaging

April 3, 2020 No Comments

Messaging as a medium is exploding. By 2020, the four largest mobile messaging apps – WhatsApp, Facebook Messenger, WeChat and Viber – had more than 6 billion users in total, surpassing the 4.5 billion users on the four largest social networks (Facebook, Twitter, Instagram and LinkedIn). We are active messaging app users every day, in both our professional and personal lives.

WipeDrive and the IT Asset Lifecycle

April 2, 2020 No Comments

The assets of your company or organization are constantly being cycled through the stages of active use, upgrade, or disposal. When we discuss IT assets including servers, laptops, and mobile devices, managing the security of the data these assets contain often requires disk wipe software like WipeDrive to allow secure disposal at end of life.

How compliance teams are using AI technology to get ahead

March 25, 2020 No Comments

Compliance teams in businesses of all shapes and sizes across the globe require a number of different tactics to ensure that they are meeting legal or organizational policies set in place, but there is a newcomer in the form of AI that is proving to shake up the way compliance teams conduct business. Artificial intelligence is starting to prove yet again that it might be the solution for businesses.

BEST CYBERSECURITY PRACTICES: DATA PRIVACY

March 24, 2020 No Comments

In today’s digital age, data collection and sharing have become seamless, fast and inexpensive. Each day, people share increasing amounts of their personal information online, oftentimes unknowingly. This personal data becomes an important asset to numerous companies and government institutions all over the world. Giant organisations such as Google, Amazon, WhatsApp and Facebook have built empires based on people’s data.

White Label Ad Platform vs Building Your Own

March 20, 2020 No Comments

It’s never the norm for us, so we’re coming clear right away: we won’t be offering a decision-making model on white label vs DIY ad platform and instead we’ll try to do our best to nudge you in the right direction of the highly effective world of ready-made white label solutions.

2020 Security Foresight

March 17, 2020 No Comments

There are a lot of discussions and even more headlines about the lack of network security. Tales range from high-profile network breaches to private data from a number of organizations being accessed by unauthorized parties. IT has long protected the network and the data on it, but now, these security breaches can come from unexpected places, including devices such as wireless presentation systems.

5 Reasons Why You Might Like Being A Cybersecurity Analyst

March 5, 2020 No Comments

Do you wonder what life would be like as a cybersecurity analyst? Or maybe you want to know if cybersecurity careers are something that you would be good at? Well, if so, you’ve come to the right place. In this article, we are going to talk about five reasons why you might like being a cybersecurity analyst.

IT Briefcase Exclusive Interview: Getting the Most Out of Open Source While Managing License Compliance, Risk, and Security

March 4, 2020 No Comments

with Kendra Morton, FlexeraIn this interview, Kendra Morton, product marking manager at Flexera, discusses Software Composition Analysis (SCA) trends including leading Flexera’s annual State of Open Source License Compliance report. Read More >>>

Why DEM Matters More Than Ever in Financial Services

February 28, 2020 No Comments

Remember waiting in line at the bank? Banking customers are doing a lot less of that in the digital era, which has revolutionized the way financial services function. Live tellers and bankers have been replaced by online transactions and digital currency. Insurance, mortgages, investments, and more are also mainly handled online. Waiting is no longer an option for today’s financial services customers, who now expect instant and accurate transactions conducted on a website or mobile app. This has given rise to a new technological discipline called digital experience monitoring (DEM).

Is using crypto safer when carrying out online money transfers?

January 23, 2020 No Comments

Anyone with even a passing interest in tech or IT will be aware of the burgeoning cryptocurrency sector. Bitcoin is still the major player here and the coin that not only grabs headlines but also gives an indicator of the overall health that this sector may show. The great news for investors since the early 2010s is that the price of bitcoin has gone up overall until the present day.

Erase Your Data Securely by Using BitRaser File Eraser for Windows—Software Review

January 14, 2020 No Comments

In today’s world, data is everything. And, disclosure of critical, sensitive data like personal photos, videos can result in monetary, reputation, or business loss to an individual or an organization. Sadly, many computer users are unaware of the fact that Windows doesn’t remove the deleted data permanently. Even a quick formatted PC or external storage drive is not safe to dispose of, resell, or repurpose.

How Will The Internet of Things Impact Cyber Security?

January 10, 2020 No Comments

Each of us lives within the realm of the Internet of Things. Smartwatches track our steps as we walk to and fro in the office. We can order refills of paper towels or toothpaste by simply speaking to our smart speakers. As wonderful as all of this can be, it also means our data is being collected 24/7. Vulnerabilities in these smart devices can leave the proverbial backdoor open to our data. Both businesses and individuals are left exposed to a potential cyber-attack. But how does the Internet of Things really impact cybersecurity?

What Is Firmware in Computer Systems?

December 17, 2019 No Comments

Most people have heard of software or hardware, but if you are simply an average tech user who knows how to navigate a smartphone and not much else, you are likely unfamiliar with the word “firmware.” Yet firmware is essential to the operation of any computerized system, so it is important to understand what it means as well as how you can use it to your advantage.

How to Make Sure You Don’t Fall Victim to the Newest Malware

December 17, 2019 No Comments

Malware is evolving every day. As technology becomes more advanced, hackers and scammers follow those advancements to try and create the most cunning malware options. If you want to avoid ending up with malware on your devices, your best move will always be to stay out in front of it. But how can you do that, especially if you’re not already extremely tech-savvy? It’s simple: you can take these tips to make sure you stay up-to-date on new malware.

What is DNSSEC?

December 16, 2019 No Comments

Internet security is, to put it lightly, a really big deal. Sometimes the problem with internet security isn’t clever hackers finding ways around complex systems—sometimes the systems are just innately vulnerable. Why and where this is the case is best understood by recognizing that, when the internet was being formed in the 1980’s, it was new, its potential was wholly unknown, and it was mostly only of interest to governments, militaries, and a small few technology enthusiasts and scientists at technical universities.

TOP-5 Tools for Security: What Anonymous Browser to Choose?

December 3, 2019 No Comments

Is it a surprise for you, that not all browsers are safe? The truth is that mainstream programs, like Chrome, Safari, Opera, IE, track what you do online. What pages you visit, what you search on the Internet, what software you download. Moreover, the billing info you mention every time you do shopping is kept on the server and can be hacked effortlessly. The private mode does not make browsing confidential.

Keeping WordPress and Your Data Safe and Secure

December 3, 2019 No Comments

WordPress is a massively popular open source platform and it is estimated that either hundreds of thousands of them do get hacked each year or leave their self vulnerable to get hacked each year. It’s not that WordPress is a poor platform, far from it, it just appears that people don’t take as much care of them as they should and so robots crawling the web can easily find ways in.

IT Briefcase Exclusive Interview: How DevOps Teams Can Leverage Policy-as-Code to Scale Kubernetes

November 19, 2019 No Comments

Kubernetes and containerization make application delivery much faster. But DevOps professionals hit a brick wall when they have to prove compliance to non-coders. In this QA, Styra security strategist Chris Webber talks to us from KubeCon in San Diego on how to bridge the communication gap between DevOps and Security/Compliance professionals.

How Machine Learning and AI is Transforming the Future of Healthcare

November 14, 2019 No Comments

Artificial intelligence has been vexing us all for years. And it only continues to get better and better as time goes on. Sure, you will have some people who believe AI is a bad thing, or that it knows too much. However, whether we like it or not, AI is here to stay. Imagine a machine learning technology that can bring with it the knowledge of THOUSANDS of doctors-and bringing valuable insight to a single physician who can then make a sound treatment decision.

From Talent Loss to Data Breach: The Risks of Outdated Technology

November 13, 2019 No Comments

An impressive 91% of knowledge workers say they’re proud of the work they do and care about bigger picture objectives, according to Workfront’s 6th annual State of Work report, which surveyed 3,750 knowledge workers in the US, UK, the Netherlands, and Germany. But almost half of those surveyed struggle to be productive because of outdated workplace technology.

ADVERTISEMENT

DTX ExCeL London

WomeninTech