Inside the Briefcase






Briefcase Highlights


DATA SECURITY

New Report: Companies Passing on Password Security

October 19, 2017 No Comments

You can have the most sophisticated home security system in the world, but if you leave the front door open, it’s all for nothing. The same principle applies to enterprises. Protecting data starts with disallowing unauthorized access, and that begins with a solid username and password. Login information is the “front door” to your company’s data, but according to a recent study, most large companies are leaving basic, “dead-bolt” security measures on the table, potentially losing millions of dollars.

Security vs. Productivity: Is BYOD Worth the Risk?

October 17, 2017 No Comments

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind?

IT Briefcase Exclusive Interview: Assurance, Insurance and Guarantees – Preparing Your Organization for the Data Breach Era

October 17, 2017 No Comments

According to Forrester Research, applications are increasingly the face of interaction between companies and their customers; this includes customer-facing applications, differentiating mobile apps, internet-of-things (IoT) device interfaces and streamlined back-end processes. Meanwhile, application security technologies continue to advance based on new developer methodologies, attack vectors, application types and business needs. Moving forward, security pros must keep pace with these emerging and rapidly evolving technologies to help their organizations deploy apps that improve customer experiences without taking on new risks.

4 Website Security Tips For SMEs

October 17, 2017 No Comments

Small business owners generally don’t take internet security that seriously. I understand, of course: a lot of SMEs are so focused on their day-to-day business that they have no extra time to worry about the complexities of website security. There are other problems, however. A lot of small businesses simply think that they have nothing worth stealing, and that they are too small to ever be the target of a cyber-attack. I shouldn’t have to tell you that this is a mistake, but I will.

Backup to the Future Infographic

October 11, 2017 No Comments

Where is your data stored? Back up will be the number one use of cloud in 2019. Download this infographic to quickly learn a flexible solution for Virtual, Physical and Cloud Environments – no matter how complex.

How VPNs Solve Security Issues For SMEs

October 10, 2017 No Comments

Virtual Private Networks, or VPNs for short, used to be associated with hackers running credit card fraud schemes. In recent years, though, they’ve become hugely popular for more legitimate purposes. A lot of people use them to get around country-specific limitations on TV shows and movies, such as those put in place by Netflix and other media companies. More seriously, a lot of political activists use them to circumvent restrictions put in place by their own governments.

IT Briefcase Exclusive Interview: Minimizing Risks Brought on by the Shadow Workforce

October 4, 2017 No Comments

According to OneLogin’s Curse of the Ex-Employees report, 20 percent of organizations admit accounts belonging to former employees remain active for one month or more after an employee has left the company. Unknown to employers, these “ghost employees” are harboring company data for months or even years after leaving an organization. This has resulted in the growth of a “shadow workforce” – or an underground network of ex-employees with access to the company network. In this interview, we connected with Al Sargent, senior director at OneLogin, who shares how companies can minimize risks brought on by this shadow workforce.

Combating Financial Crime: The Increasing Importance of Financial Crimes Intelligence Units in Banking

October 4, 2017 No Comments

This white paper assesses how aware banks in Europe and North America are of FCIUs and what measures they have been taking to be more prepared for full implementation of their own FCIU.

IT Briefcase Exclusive Interview: Solving Complex Organizational Analytics Disconnects with Analytic Deployment Technology

October 4, 2017 No Comments

with Stu Bailey, Open Data GroupIn this interview, Stu Bailey, CTO from Open Data Group, shares how enterprises can make analytic deployment a core competency vital to competing successfully in today’s business environment. Read More >>>

RANSOMWARE: Industrial Control Systems

October 3, 2017 No Comments

70% of surveyed organizations surveyed an OT security compromise over the past 12 months resulting in operational disruption or loss of confidential information in their industrial networks.

IT Briefcase Exclusive Interview: Freeing Data from Vendor Lock-in; Leveraging Data for Today’s Digital Enterprise

October 3, 2017 No Comments

with Cuong Le, Data DynamicsIn this interview, Data Dynamics’ Senior Vice President of Field Operations, Cuong Le, shares his thoughts on why IT professionals need to be put back in total control of their data – and the best ways to make that happen. Read More >>>

5 Steps to Improve Your Company’s IT Security

October 2, 2017 No Comments

As a business owner, you obviously want to make your IT systems as secure as possible. But even if you invest in expensive and sophisticated cybersecurity software, you can still be vulnerable, if you have your basic IT management done wrong. In fact, most security breaches are results of simple mistakes that could have been easily avoided. Here are five tips to make your IT environment a safer place by just doing the basic things right.

Awareness, Education, Prevention: The 3-Factor Approach to Mitigate Insider Threats

October 2, 2017 No Comments

Insider threats continue to be an organization’s number one weakness. This is because an insider is able to bypass any firewalls, detection systems, or access gates. Most breaches that are the result of insiders happen from negligent employees or managers. Malicious insider incidents are fewer but often cause far more damage. How much damage can one employee do to an organization? The answer is dependent on access, information quality, and intent. Everyone who works with or in an organization is an insider.

Integrating Security in the DevOps Workflow: Must You Choose Between Time, Change and Efficiency?

September 29, 2017 No Comments

Software and app development is moving at warp speed, thanks to the agile approach and role of DevOps. But security struggles to keep pace, as traditional physical and virtual perimeter solutions are not sufficient to address vulnerabilities in code that are being updated and deployed on a daily basis. As a result, DevOps must become more aware of security and rethink how they build it into their software at the code level. In this Q&A, security industry veteran Manish Gupta discusses how organizations can change their behavior and mindset, bringing security in from the start of the software development process.

Indicators of Compromise in DNS Logs

September 27, 2017 No Comments

Do you monitor your DNS logs? If not, you may be missing important clues about cyber attacks on your network. I recently attended SANS Network Security 2017 and watched a presentation by Seth Misenar on what he calls “actionable detects” in DNS logs. Security teams can use these indicators to prevent and detect security problems.

IT Briefcase Exclusive Interview: Dissecting the Anatomy of a Breach

September 27, 2017 No Comments

In this IT Briefcase exclusive interview, Joseph Carson, chief security scientist at Thycotic, explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security. By dissecting the make-up of a privileged account hack, it can be shown exactly how cyber criminals target their victims as well as what can be done moving forward to reduce risk and prevent abuse of critical information assets.

7 Measures Businesses Should Apply to Increase their Cybersecurity

September 26, 2017 No Comments

It seems like there isn’t a single company that doesn’t rely on various online services and web-based applications and technologies to carry out various day-to-day tasks. Whether it’s advertising, buying or selling, identifying a new market, communicating with partners, suppliers, vendors, and customers or something simple as completing a bank transaction, the internet is becoming an integral part of a smooth-functioning business.

Increased Recognition of Cybersecurity Spurs Investment, but May Ignore Internal Risk

September 22, 2017 No Comments

The recent global cybersecurity history is pockmarked with incidents that have grabbed global headlines, produced outrage, and caused political strife. What’s more, the cyberattacks listed above are distinct in their size, source, and categorization. WannaCry and NotPetya were large-scale ransomware attacks. Equifax suffered a breach from hackers exploiting an outdated patch in their web application framework. And, Parliament, the DNC, and the Clinton campaign were all penetrated through email phishing scams.

IT Briefcase Exclusive Interview: Using Device-native Capabilities to Secure Devices with Mobility Strategies

September 21, 2017 No Comments

with Henning Volkmer, Cortado Mobile Solutions Inc.In this interview, Henning Volkmer, president and CEO of Cortado Mobile Solutions Inc., shares his thoughts on using device-native capabilities to secure devices implementing productive mobility strategies, as well the benefits, simplicity and cost savings a cloud-based approach offers. Read More >>>

IT Briefcase Exclusive Interview: The Growing and Continuous Threat of Ransomware

September 18, 2017 No Comments

with Linus Chang, BackupAssistIn today’s exclusive IT Briefcase interview, BackupAssist’s CEO, Linus Chang, shares his thoughts on the growing and continuous threat of ransomware, not only across enterprise environments, but the small-to-medium business (SMB) space as well. Read More >>>

IT Briefcase Exclusive Interview: Equifax Data Breach – Protecting Privacy and Avoiding a PR Nightmare

September 15, 2017 No Comments

with Patrick Carey, Black Duck SoftwareIn this interview, Patrick Carey, VP of Product at Black Duck Software, gives his perspective the Equifax data breach and how to protect privacy moving forward. Read More >>>

Why Are Windows 10 Migrations Picking Up Speed?

September 12, 2017 No Comments

Last year, few IT professionals believed they would be close to completing their migration to Windows 10 by this time. Some even estimated that they wouldn’t be at the halfway mark. Given the scale of this mission—migrating thousands of systems without business interruption—this conservative outlook is perhaps understandable.

Customers of the World’s Largest Organizations continue to suffer from Cyber Attacks

September 11, 2017 No Comments

Every day, there appear new pieces of evidence that the world’s Cyber Security (CS) industry still does not correspond to the required levels of safety. Moreover, there is no agency that would be able to eliminate the detected vulnerabilities and resolve the related problems in tight deadlines. As a result, many people have already become victims of hackers, internet offenders who abuse their financial or personal data for personal benefit or just for fun.

IT Briefcase Exclusive Interview: The Value of Security Testing

September 8, 2017 No Comments

While many companies might put security testing at the bottom of their lists, it’s a critical step businesses need to take to ensure their solutions can properly protect and defend against cyber-attacks. There are numerous ways that enterprises can go about the testing of solutions, but it’s important to understand the industry best practices and recommendations when it comes to testing and evaluation.

IT Briefcase Exclusive Interview: Using Deception Technologies to Turn the Tables on Attackers

August 30, 2017 No Comments

with Raj Gopalakrishna, AcalvioIn this interview, Raj, the Co-Founder and Vice President of Architecture at Acalvio discusses what businesses need to know in order to detect, engage and respond quickly to malicious activity on their networks Read More >>>

Why Mobile Security Relies on a Great User Experience

August 30, 2017 No Comments

There’s no doubt that mobile security is a significant concern for individuals and for businesses. In the age of BYOD, organizations simply cannot ignore the risks that come from individual devices — and even consumers themselves are beginning to realize that their beloved smartphones and tablets are a target for cybercriminals. However, as mobile security has become a priority, so has the perception that it takes precedence over everything else, including usability. That’s not to say that user experience is more important, but most developers have struggled to find balance between the two.

IT Briefcase Exclusive Interview: Vector Solutions Boosts IT Security

August 28, 2017 No Comments

The demands of IT security professionals are growing every day. Cybersecurity attacks are not only occurring at unprecedented rates, but the diversity of Cybercrimes is also increasing. Professionals require constant updates to skills and training to stay ahead of the next potential threat. It’s vital to an organization’s security that their staff is well-informed with latest knowledge and training available in the IT field. One of the leading providers of online training is Vector Solutions. We sat down with the SVP of Content and Communications, Victoria Zambito, to learn more about how their IT training and performance support solutions are helping organizations stay safe and ahead of the curve.

We Are Fast Approaching the Era of the Super Hacker

August 24, 2017 No Comments

There is a lot of hype all over the web about Artificial Intelligence being used in cyber security; how Artificial Intelligence will outthink the hackers, even predicting attacks before they happen. Nevertheless, the token has two sides. Those who create cyber security software and those who create hacking tools are of the same flock of birds, only with a different colour of feathers. While designers of cyber security programs are trying to think one step ahead of the villains, the villains are already thinking five to 10 steps ahead. Cyber security is still a reactionary game. While we are looking for the best NBN plans and worried about internet speed, we need to be worried about our security.

IT Briefcase Exclusive Interview: Endpoint Security, Ransomware and the End of Evasive Malware

August 17, 2017 No Comments

with Lenny Zeltser, MinervaIn this interview, Lenny Zeltser, Vice President of Products at Minerva discusses endpoint security, ransomware, and explains how you can ensure prevention before detection.Read More >>>

IT Briefcase Exclusive Interview: The Current State of IT Security

August 17, 2017 No Comments

with Ondrej Krehel, LIFARS LLCOndrej Krehel, CEO and Founder of LIFARS, an international cybersecurity and digital forensics firm, discusses the current state of the security industry and what is in store for the rest of 2017 and beyond. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech