August 30, 2017
There’s no doubt that mobile security is a significant concern for individuals and for businesses. In the age of BYOD, organizations simply cannot ignore the risks that come from individual devices — and even consumers themselves are beginning to realize that their beloved smartphones and tablets are a target for cybercriminals. However, as mobile security has become a priority, so has the perception that it takes precedence over everything else, including usability. That’s not to say that user experience is more important, but most developers have struggled to find balance between the two.
August 28, 2017
The demands of IT security professionals are growing every day. Cybersecurity attacks are not only occurring at unprecedented rates, but the diversity of Cybercrimes is also increasing. Professionals require constant updates to skills and training to stay ahead of the next potential threat. It’s vital to an organization’s security that their staff is well-informed with latest knowledge and training available in the IT field. One of the leading providers of online training is Vector Solutions. We sat down with the SVP of Content and Communications, Victoria Zambito, to learn more about how their IT training and performance support solutions are helping organizations stay safe and ahead of the curve.
August 24, 2017
There is a lot of hype all over the web about Artificial Intelligence being used in cyber security; how Artificial Intelligence will outthink the hackers, even predicting attacks before they happen. Nevertheless, the token has two sides. Those who create cyber security software and those who create hacking tools are of the same flock of birds, only with a different colour of feathers. While designers of cyber security programs are trying to think one step ahead of the villains, the villains are already thinking five to 10 steps ahead. Cyber security is still a reactionary game. While we are looking for the best NBN plans and worried about internet speed, we need to be worried about our security.
August 17, 2017
with Lenny Zeltser, MinervaIn this interview, Lenny Zeltser, Vice President of Products at Minerva discusses endpoint security, ransomware, and explains how you can ensure prevention before detection.Read More >>>
August 17, 2017
with Ondrej Krehel, LIFARS LLCOndrej Krehel, CEO and Founder of LIFARS, an international cybersecurity and digital forensics firm, discusses the current state of the security industry and what is in store for the rest of 2017 and beyond. Read More >>>
August 15, 2017
In May 2017, WannaCry ransomware hit more than 300,000 computers in 150 countries—including multiple systems at Britain’s NHS, Spanish phone company Telefónica, and German state railways. It spread itself from machine to machine, encrypting hard disks and then demanding ransom to return the data to the owners. Petya followed in June, exploiting the same vulnerability as WannaCry.
August 9, 2017
Inclement weather. Catastrophic hardware failure. A devastating cyberattack. A disgruntled employee. Even the best-run, most successful company can potentially end up crippled if caught unprepared by any of these incidents. Hardware can be damaged or destroyed. Critical data can end up lost or stolen. Ongoing systems can come crashing down, crushing your lines of business.
August 8, 2017
with Arun Rao, GrandCanalsIn this interview, Arun Rao discusses how to support businesses who are struggling with the “Amazonification” of the fulfillment chain where there are rising costs and rising expectations on delivery times. Read More >>>
August 4, 2017
with Peter Kraatz, DatalinkIn this interview, Peter Kraatz at Datalink shares his expertise on the due diligence necessary for organizations to successfully move to the cloud and the challenges IT professionals should prepare for prior to a cloud migration. Read More >>>
August 1, 2017
DevOps might be the best thing to happen to application security. Although, admittedly, some IT security professionals may not feel that way. First, organizations started connecting their systems and employees to the Internet. Then the introduction of the smartphone launched the BYOD trend, followed by the maturation of cloud computing-based applications and services. These developments created significant new security risks.
August 1, 2017
Research results provide insight into current DevOps security practices at both large and mid-sized enterprises.
July 27, 2017
with Srivats Ramaswami, 42QIn this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages in efficiency and cost. Read More >>>
July 24, 2017
Securing any type of software environment is a big task. But if you use containers, constructing and enforcing a solid security program can be especially difficult. That’s because a containerized environment involves so many different layers as compared to other types of infrastructure. With virtual machines, you have only a host operating system (OS), a guest OS, and a guest application environment to secure. On bare metal, and in most types of cloud-based environments, the security situation is even simpler because there are fewer layers of software.
July 19, 2017
So-called “ransomware” has been making headlines again, most recently with the WannaCry malware. The computer code encrypts files on computers, making them inaccessible to the owners. A certain sum of money, usually in the form of Bitcoin, is demanded by the attacker in exchange for being sent the “key” needed to decrypt the files. The malware can infiltrate any type of device connected to the internet: servers, desktop computers and laptops, even smartphones.
July 19, 2017
with Brian Kelly, CloudGenaIn this interview, Brian Kelly, CEO & Founder of CloudGenera provides insights on the current challenges in selecting the right cloud solution to satisfy businesses specific individual needs, and how CloudGenera is helping companies, like Hewlett Packard Enterprise (HPE), overcome them. Read More >>>
July 19, 2017
with Jack Kudale, LaceworkIn this interview, Lacework CEO Jack Kudale discusses the challenges of cloud computing today and how to overcome cloud security challenges. Read More >>>
July 17, 2017
Any business that is at the receiving end of a cyberattack will have its fill of distractions to stem the course of the attack while recovering lost or frozen data and mollifying customers whose personal information might have been compromised. Many targeted businesses, however, subsequently discover that a cyberattack and its consequences are only the beginning of their problems.
July 12, 2017
with Sundip Arora, KaminarioIn this interview, Kaminario, shares his take on how this rapid increase in retail technology means retailers must implement a solid storage backbone to handle the exponential growth of data and stay ahead of their competition. Read More >>>
July 11, 2017
with Gabby Nizri, AyehuIn this interview,Gabby Nizri, Co-Founder and CEO of Ayehu Inc., discusses how automation, machine learning and artificial intelligence are being used as a force multiplier to help organizations overcome the staffing crunch and operate at peak performance. Read More >>>
June 29, 2017
with Daisy Hernandez, SAPIn this interview, VP of Product Management for SAP Jam Collaboration, Daisy Hernandez, shares her thoughts on how the adoption and application of digital collaboration are shaping the evolution of the enterprise. Read More >>>
June 29, 2017
Businesses continue to see an uptick in IoT devices used within the office, but often times are not taking the appropriate measures to track and secure these seemingly innocuous devices. Andrew Newman, CEO and founder of Reason Software Company, shares his insight on internet connected devices in small-to-medium businesses and how these companies can keep themselves protected from IoT-based attacks.
June 28, 2017
Edward Snowden’s leak about massive government surveillance happened almost four years ago, but the debate about internet privacy is far from over. Net neutrality is under threat, and Internet Service Providers (ISPs) work to collect and share your data with the US government. The UK government has repeatedly called for investigation into encrypted messaging platforms like WhatsApp. The internet we all know and love is under threat.
June 27, 2017
WatchGuard® Technologies, a leader in advanced network security solutions, today announced the findings of its quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. Among its most notable findings, the report revealed that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017.
June 27, 2017
with Sander Barens, ExpereoIn this interview, Sander Barens discusses new solutions and evolutions driving internet into exciting places today and keeping enterprise business ahead of the game, from managed internet networks to SD-WAN services. Read More >>>
June 27, 2017
with Keith Fenech, RevulyticsIn this interview, Keith Fenech, VP, Software Analytics at Revulytics, speaks with IT Briefcase on how collecting and analyzing software usage data can help developers make faster, more efficient decisions at all stages of the development lifecycle. Read More >>>
June 26, 2017
In today’s always-on, connected world, exponential data growth driven by the Internet of Things (IoT) is placing unprecedented demands on the data center, and current IT environments are struggling to handle the influx. To address continuously changing data center needs, IT managers are turning to converged and hyperconverged solutions to simply and quickly deploy IT.
June 20, 2017
In addition to contributing to the exponential increase in data, security concerns, and strain on enterprise networks, the growth of the Internet of Things (IoT) is creating demand for upgraded wireless sensor nodes in the enterprise. And as IoT becomes more prevalent in the enterprise, the ease with which we as IT professionals can deploy and create sensor networks increases in tandem.
June 20, 2017
In DevOps, when you’re deploying hundreds, possibly thousands, of features and bug fixes a week, security cannot afford to be an afterthought. The beautiful thing about DevOps is that it is a process that continues to get more streamlined, faster and efficient – and deployments will be that much better if they are also fully secure before release time comes.
June 16, 2017
with James E. Lee, WaratekIn this interview, an expert in data privacy and security, Waratek EVP James E. Lee dives into a common method of protection in web application security, why it’s problematic and where the industry is headed. Read More >>>