August 15, 2017
In May 2017, WannaCry ransomware hit more than 300,000 computers in 150 countries—including multiple systems at Britain’s NHS, Spanish phone company Telefónica, and German state railways. It spread itself from machine to machine, encrypting hard disks and then demanding ransom to return the data to the owners. Petya followed in June, exploiting the same vulnerability as WannaCry.
August 9, 2017
Inclement weather. Catastrophic hardware failure. A devastating cyberattack. A disgruntled employee. Even the best-run, most successful company can potentially end up crippled if caught unprepared by any of these incidents. Hardware can be damaged or destroyed. Critical data can end up lost or stolen. Ongoing systems can come crashing down, crushing your lines of business.
August 8, 2017
with Arun Rao, GrandCanalsIn this interview, Arun Rao discusses how to support businesses who are struggling with the “Amazonification” of the fulfillment chain where there are rising costs and rising expectations on delivery times. Read More >>>
August 4, 2017
with Peter Kraatz, DatalinkIn this interview, Peter Kraatz at Datalink shares his expertise on the due diligence necessary for organizations to successfully move to the cloud and the challenges IT professionals should prepare for prior to a cloud migration. Read More >>>
August 1, 2017
DevOps might be the best thing to happen to application security. Although, admittedly, some IT security professionals may not feel that way. First, organizations started connecting their systems and employees to the Internet. Then the introduction of the smartphone launched the BYOD trend, followed by the maturation of cloud computing-based applications and services. These developments created significant new security risks.
August 1, 2017
Research results provide insight into current DevOps security practices at both large and mid-sized enterprises.
July 27, 2017
with Srivats Ramaswami, 42QIn this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages in efficiency and cost. Read More >>>
July 24, 2017
Securing any type of software environment is a big task. But if you use containers, constructing and enforcing a solid security program can be especially difficult. That’s because a containerized environment involves so many different layers as compared to other types of infrastructure. With virtual machines, you have only a host operating system (OS), a guest OS, and a guest application environment to secure. On bare metal, and in most types of cloud-based environments, the security situation is even simpler because there are fewer layers of software.
July 19, 2017
So-called “ransomware” has been making headlines again, most recently with the WannaCry malware. The computer code encrypts files on computers, making them inaccessible to the owners. A certain sum of money, usually in the form of Bitcoin, is demanded by the attacker in exchange for being sent the “key” needed to decrypt the files. The malware can infiltrate any type of device connected to the internet: servers, desktop computers and laptops, even smartphones.
July 19, 2017
with Brian Kelly, CloudGenaIn this interview, Brian Kelly, CEO & Founder of CloudGenera provides insights on the current challenges in selecting the right cloud solution to satisfy businesses specific individual needs, and how CloudGenera is helping companies, like Hewlett Packard Enterprise (HPE), overcome them. Read More >>>
July 19, 2017
with Jack Kudale, LaceworkIn this interview, Lacework CEO Jack Kudale discusses the challenges of cloud computing today and how to overcome cloud security challenges. Read More >>>
July 17, 2017
Any business that is at the receiving end of a cyberattack will have its fill of distractions to stem the course of the attack while recovering lost or frozen data and mollifying customers whose personal information might have been compromised. Many targeted businesses, however, subsequently discover that a cyberattack and its consequences are only the beginning of their problems.
July 12, 2017
with Sundip Arora, KaminarioIn this interview, Kaminario, shares his take on how this rapid increase in retail technology means retailers must implement a solid storage backbone to handle the exponential growth of data and stay ahead of their competition. Read More >>>
July 11, 2017
with Gabby Nizri, AyehuIn this interview,Gabby Nizri, Co-Founder and CEO of Ayehu Inc., discusses how automation, machine learning and artificial intelligence are being used as a force multiplier to help organizations overcome the staffing crunch and operate at peak performance. Read More >>>
June 29, 2017
with Daisy Hernandez, SAPIn this interview, VP of Product Management for SAP Jam Collaboration, Daisy Hernandez, shares her thoughts on how the adoption and application of digital collaboration are shaping the evolution of the enterprise. Read More >>>
June 29, 2017
Businesses continue to see an uptick in IoT devices used within the office, but often times are not taking the appropriate measures to track and secure these seemingly innocuous devices. Andrew Newman, CEO and founder of Reason Software Company, shares his insight on internet connected devices in small-to-medium businesses and how these companies can keep themselves protected from IoT-based attacks.
June 28, 2017
Edward Snowden’s leak about massive government surveillance happened almost four years ago, but the debate about internet privacy is far from over. Net neutrality is under threat, and Internet Service Providers (ISPs) work to collect and share your data with the US government. The UK government has repeatedly called for investigation into encrypted messaging platforms like WhatsApp. The internet we all know and love is under threat.
June 27, 2017
WatchGuard® Technologies, a leader in advanced network security solutions, today announced the findings of its quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. Among its most notable findings, the report revealed that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017.
June 27, 2017
with Sander Barens, ExpereoIn this interview, Sander Barens discusses new solutions and evolutions driving internet into exciting places today and keeping enterprise business ahead of the game, from managed internet networks to SD-WAN services. Read More >>>
June 27, 2017
with Keith Fenech, RevulyticsIn this interview, Keith Fenech, VP, Software Analytics at Revulytics, speaks with IT Briefcase on how collecting and analyzing software usage data can help developers make faster, more efficient decisions at all stages of the development lifecycle. Read More >>>
June 26, 2017
In today’s always-on, connected world, exponential data growth driven by the Internet of Things (IoT) is placing unprecedented demands on the data center, and current IT environments are struggling to handle the influx. To address continuously changing data center needs, IT managers are turning to converged and hyperconverged solutions to simply and quickly deploy IT.
June 20, 2017
In addition to contributing to the exponential increase in data, security concerns, and strain on enterprise networks, the growth of the Internet of Things (IoT) is creating demand for upgraded wireless sensor nodes in the enterprise. And as IoT becomes more prevalent in the enterprise, the ease with which we as IT professionals can deploy and create sensor networks increases in tandem.
June 20, 2017
In DevOps, when you’re deploying hundreds, possibly thousands, of features and bug fixes a week, security cannot afford to be an afterthought. The beautiful thing about DevOps is that it is a process that continues to get more streamlined, faster and efficient – and deployments will be that much better if they are also fully secure before release time comes.
June 16, 2017
with James E. Lee, WaratekIn this interview, an expert in data privacy and security, Waratek EVP James E. Lee dives into a common method of protection in web application security, why it’s problematic and where the industry is headed. Read More >>>
June 15, 2017
Although the internet is one of the greatest game changers of the 20th century, it comes with its own share of issues. Security breaches have continued to plague the cyberspace, leading to losses of billions of dollars. In fact, according to Forbes, cybercrime is expected to have cost the US economy $2 trillion by 2019. And what’s more frightening is that there appears to be no definite solution to cybercrime in sight. In fact, the advent of the IoT is expected to make cybersecurity even more difficult to enforce.
June 15, 2017
In baseball, there are few plays more exhilarating, more memorable and more impactful on the final score than a long home run. But, as any fan can tell you, home runs aren’t the only way to take down an opponent. In baseball there are plenty of ways to score. Some of them aren’t as picturesque as a long ball, but they all inflict certain degrees of damage. Defenses have to do their best to prepare for every occurence and prevent the other team from scoring.
June 14, 2017
It’s a familiar refrain: Cloud services and mobile devices have made the challenges of safeguarding company data even more acute. Sensitive information now travels far beyond the relative safety of in-house networks into consumer cloud storage services where it’s accessed by employees using unsecured mobile devices. Yet while these risks are well understood, the number of data breaches continues to rise.
June 14, 2017
We all wait for the summer to take some time off, unwind and recharge. And while summertime might be downtime for you, that’s not the case for cyber-attacks, which are increasing in an alarming rate: from the most recent ransomware attack using the WannaCry computer worm, which crippled operations worldwide, to sophisticated nation-state activities, attacks directly on banks such as the SWIFT attack, and new areas such as the DDoS attacks using IoT botnets.
June 5, 2017
Sixty Nine percent of businesses have security solutions that are outdated and inadequate. View Infographic