Inside the Briefcase


Ironclad SaaS Security for Cloud-Forward Enterprises

Ironclad SaaS Security for Cloud-Forward Enterprises

The 2015 Anthem data breach was the result of a single user at an Anthem subsidiary clicking on a phishing email. Yet, the breach exposed the sensitive information of approximately 78.8 million members and cost the company more than...





Briefcase Highlights


DATA SECURITY

Ironclad SaaS Security for Cloud-Forward Enterprises

October 5, 2018 No Comments

The 2015 Anthem data breach was the result of a single user at an Anthem subsidiary clicking on a phishing email. Yet, the breach exposed the sensitive information of approximately 78.8 million members and cost the company more than $100 million. A quick search for “security breach” won’t just deliver news about the biggest scandal from the past few years. Instead, you’ll likely find one from just yesterday or last week. Following the digital transformation, data breaches are happening more often.

5 Best Anti Spyware Software with Complete Protection

October 2, 2018 No Comments

At the mention of spyware, the first thing that comes to the minds of frequent PC users is a type of malware that steals your personal and influential data without your realization and consent. These spyware attacks can come in the form of legitimate apps and programs but, they can collect browsing and banking records behind the scenes. The list below is a collective and reliable detail of the top five best anti-spyware software that come with additional protection.

Facebook security breach affects 50 million accounts

October 1, 2018 No Comments

Facebook Inc (FB.O) said on Friday that hackers were able to steal digital login codes which allowed them to take over nearly 50 million user accounts.

What Does Unhackable Mean?

October 1, 2018 No Comments

“I want to make this unhackable” is a question that comes up fairly often when working with security teams, tech contractors, and security professionals. Sometimes it’s a CEO who simply wants to protect business assets at any costs, but other times it’s an honest wish for better security, says Naomi Hodges, Cybersecurity Advisor at Surfshark VPN.

3 Things That Can Help Protect Your Business from Cyber Security Risks

October 1, 2018 No Comments

Companies all over the world are increasingly concerned with cybersecurity after a number of high-profile cyber-attacks devastated companies and governments all over the world in the last few years. Clearly, this is a growing threat that must be addressed by business owners if damages are to be minimised and prevented. No one is safe – from small companies to large corporations – hackers are targeting businesses at all levels because they know that there’s a lot to be gained by stealing data and causing disruption to everyday operations.

Hints for Securing Network Traffic To and From AWS VPCs

September 19, 2018 No Comments

If you have connectivity with one or more data centers, you are likely using the AWS recommended Global Transit Network architecture. In this design, organizations typically use AWS Direct Connect or IPSec VPN connectivity to enable traffic from their private, on-premises data center to their AWS cloud, and specifically to their Global Transit Hub VPC. AWS Direct Connect is a private link into AWS regions that provides bandwidth, but the service is not natively encrypted. Encrypting this traffic can be accomplished by following the steps AWS outlines in its Create a VPN Direct Connect Knowledge Center article.

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

September 13, 2018 No Comments

What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve.

Cybersecurity Insiders 2018 Application Security Report

September 13, 2018 No Comments

What happens when you mix swelling application portfolios and eager attackers? According the 2018 Application Security Report from Cybersecurity Insiders, you find 62% of organizations less than fully confident in their application security posture. With over 20 charts and graphs, the 2018 Application Security Report gives you insight into the most critical appsec trends and challenges, and provides an overview of the tools cybersecurity professionals choose first when keeping applications safe and secure.

Trending IT Solutions That are Changing the Way We Do Business Online

September 4, 2018 No Comments

If you’re about to launch your business and you’re looking for the trending IT solutions that might help you achieve your business goals, you’re in the right place. We’ll introduce a few IT solutions that could change the way you do things. Since everyone is online today, doing business online has become the norm.

5 Security Tips to Know When Using a Shared Hosting

September 4, 2018 No Comments

In 2017, losses from cybercrime cost its victims over $1.4 billion, reports SC Media. This number is set to increase if one is to believe the 2018 Current State of Cybercrime report. There can be no doubt that using the most efficient cybersecurity tools is paramount to any business owner who wants to succeed. Sadly, protecting a website using a shared server is a challenge. To do this you’ll need to use specialized tactics.

Are you a target? Cyberthreats Infographic

August 28, 2018 No Comments

No business is safe from cyberthreats. What’s the best defense? Arm your enterprise with consistent, reliable threat intelligence.

Avoid Spam: A Simple Solution

August 27, 2018 No Comments

Spam can become a serious problem for each Internet user. Spammed email, comments, and fake accounts don’t let users enjoy their pastime online as well as complicate the life of websites’ owners. Being unusable to solve such a problem on their own, millions of users throughout the world install special Anti-spam programs which help them easily get rid of spam forever.

Top Three Solution Models Cisco Identity Services Engine (ISE) Offers

August 27, 2018 No Comments

Any type of data which touches your business’s network is a potential threat. In the corporate world, networks are extremely vulnerable because of the immense quantity of data transfers. This is why Cisco has designed a next-generation security program to filter out and protect your network against threat vectors.

You Have Been Hacked: 5 Killer Ways to Undo Hacking

August 24, 2018 No Comments

Statistics show that hackers steal anywhere from $1 to $450 dollars per account and then sell the information they have gained on the dark web, according to Credit Donkey. It’s also been reported that they use stolen information in as little as 9 minutes after stealing it and continue to use it up to 1200 times before its dismissed. Furthermore, in one year they managed to rob 158 million individual’s social security numbers in a total of 1579 security breaches.

How To Protect Your Company’s Technology & Equipment

August 20, 2018 No Comments

Running a business that utilizes a wide range of technology is no easy feat. In addition to all of the stress and challenges of running a business, you are also relying very heavily on technology which, as everyone knows, can be temperamental. Technology has a tendency to break down at crucial times, which is why any business owner that relies on technology for their operation considers a few key steps to take to either reduce the likelihood of this happening or to protect their company if the technology does break down. Read on for a few tips that could be crucial to your company’s success.

Risk and Reward: Docker Security Threats You Need to Know About

August 13, 2018 No Comments

Docker is here to stay. It’s only natural that the computer science industry leans toward that which is more efficient and more universal. If you were handed keys to a new sports car, you’re apt to leave your old car, 9 times out of 10. But with new things come new risks. In the case of a new high-end speed devil, one risk lies in having to adjust to the new car — how it handles, its mileage, how easy it is to scrape against curbs because of the low ride height. Not only that, but you’re bound to catch attention, and sometimes, it’s the attention of unscrupulous elements.

IT Briefcase Exclusive Interview: Only One-Quarter Who Pay Ransomware Fees Get Their Data Back

August 1, 2018 No Comments

with Linus Chang, BackupAssistIn this discussion with Linus Chang, Co-Founder and CEO of BackupAssist, we learn why the strategy of planning to pay the ransom in the wake of a ransomware attack is misguided. Read More >>>

The Rocky Road to Healthcare IoT Security

July 24, 2018 No Comments

In today’s healthcare world, the Internet of Things or IoT stands at the core of digital transformation along with blockchain, VR, AR, and other forefront technologies. Healthcare organizations will undoubtedly benefit from adopting IoT. According to a recent report on PRNewswire, the global market’s volume for IoT sensors in healthcare accounted for $1.1 billion in 2017. The report also forecasts the market to reach $1.9 billion by 2022, growing at 12.7% CAGR. Still, the increasing interest in connected devices and dedicated enterprise mobile development inevitably clashes with security concerns. While regular security breaches in healthcare carry a threat to sensitive clinical and patient identity data, IoT breaches can put patient health at risk.

Cybersecurity Vs. User-Friendliness – Can We Have Both?

July 24, 2018 No Comments

In the digital era that we live in, security is the most important aspect when it comes to our online activities. Another aspect is the user experience, which has become more and more vital, especially in recent years. Bad news is that it is believed that in many ways, these two aspects are kind of opposite, given the fact that some people think that good security is equal to a less friendly user experience.

IT Briefcase Exclusive Interview: Why SMBs Desperately Need Cyber Insurance and How to Select the Best Coverage

July 23, 2018 No Comments

Cyber attacks have become an unfortunate yet inevitable part of doing businesses today. And in the past few years, small and medium-sized businesses (SMBs) have emerged as a major attack target. In fact, according to the Ponemon Institute, more than 55 percent of SMBs experienced a data breach involving customer and employee information in just the past 12 months.

How the Need for Online Security has Changed the Business World

July 23, 2018 No Comments

So much of the modern business world is now focused around computers. From the way colleagues distributed across countries or even continents can communicate in real-time to file storage solutions located in the cloud, firms are now more likely than ever to be online. But with the benefits of Internet business come the risks, and online security is also now high on the agenda. This article will look at how businesses have had to adapt to a risky new world of cybercrime, hacking, data loss and more.

IT Briefacse Exclusive Interview: The Many Benefits of Sophisticated Forensic Software

July 17, 2018 No Comments

Veteran technology leader Martin Riegel recently was named Chief Executive Officer of STRmix Ltd., the newly formed subsidiary of the Institute of Environmental Science and Research (ESR). IT Briefcase had an opportunity to talk to Riegel about his background in technology and his plans for STRmix Ltd., which was founded to better serve customers of STRmix – the sophisticated forensic software used to resolve mixed DNA profiles previously thought to be too complex to interpret.

3 Ways to Make Your Business Safer

July 10, 2018 No Comments

Making sure that your business is a safe and protected environment is very beneficial when it comes to making a more productive and creative workspace. If your employees are more concerned about health and safety issues than they are about maintaining high levels of customer satisfaction, then you have a problem. Creating a safer business means a multi-pronged approach that will cover every potential risk that your company faces and devising a strategy that minimizes those risks.

How Adaptive Cyber Security Can Enable Digital Health Adoption

June 27, 2018 No Comments

Digital health focuses on connecting the systems, tools, medical devices, and services together that deliver needed healthcare to each of us and gives critical data insights to each player across the healthcare delivery landscape that weren’t available before. According to the recent 8th Annual Industry Pulse Report from Change Healthcare, security and privacy concerns are causing healthcare payers and providers to strongly reconsider whether or not they want to adopt these digital health technologies and mobile tools.

Helping Address GDPR Compliance Using Oracle Security Solutions

June 25, 2018 No Comments

This whitepaper explains how Oracle Security solutions can be used to help implement a security framework that addresses GDPR.

Oracle Perspective: The Rise of the Cloud Security Architect

June 25, 2018 No Comments

As organizations are adjusting their priorities around a cloud-centric strategy, one position has stood out as one of the most central and strategic in meeting security and compliance milestones—the Cloud Security Architect (CSA).

Keeping Pace at Scale: Results From Oracle and KPMG Cloud Threat Report 2018

June 25, 2018 No Comments

View this infographic to view the results from a recent Oracle and KPMG cloud threat report 2018.

How to Improve Your Online Privacy and Security in 8 Easy Steps

June 25, 2018 No Comments

With recent news about both Facebook and Google keeping an eye on our personal info, online privacy and security are more important than ever. If some of us continue to take them lightly, we will end up losing them to hackers. We must make sure to protect every bit of crucial data we store on our computers, tablets, and smartphones. Absolute privacy when using the Internet is a myth. Someone somewhere is always spying on our online activities. Don’t go thinking that you have nothing to hide, as most people do.

What can you do with your Cryptocurrency?

June 25, 2018 No Comments

With the fuss happening due to cryptocurrency, there are a lot of people trading it in the society. Besides the trading, people aren’t aware of the products and services that they could get through the cryptocurrency. You must also check how to invest in ICO to utilize your cryptocurrency.

Cybersecurity and the Evolution of Managed Security Services

June 20, 2018 No Comments

What can cybersecurity learn from economics? Some might recognize the current skills gap as a product of demand outstripping supply. This is great news for the computer science major hoping to capitalize on years behind the keyboard. Less so for the chief information security officer (CISO) whose budget may not allow for extravagances like hiring a fully-staffed team. Another economic lesson deals with the so-called law of diminishing returns.

ADVERTISEMENT

DTX ExCeL London

WomeninTech