Inside the Briefcase


IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

with Srivats Ramaswami, 42Q
In this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages...

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

with Sander Barens, Expereo
In this interview, Sander Barens discusses new solutions and evolutions driving internet into exciting places today and keeping enterprise business ahead of the game, from managed internet networks to SD-WAN services. Read More >>>





Briefcase Highlights


DATA SECURITY

The 5 Biggest Ways WannaCry and Petya Are Changing Enterprise IT

August 15, 2017 No Comments

In May 2017, WannaCry ransomware hit more than 300,000 computers in 150 countries—including multiple systems at Britain’s NHS, Spanish phone company Telefónica, and German state railways. It spread itself from machine to machine, encrypting hard disks and then demanding ransom to return the data to the owners. Petya followed in June, exploiting the same vulnerability as WannaCry.

Three Things Every Business Needs To Be Disaster-Proof

August 9, 2017 No Comments

Inclement weather. Catastrophic hardware failure. A devastating cyberattack. A disgruntled employee. Even the best-run, most successful company can potentially end up crippled if caught unprepared by any of these incidents. Hardware can be damaged or destroyed. Critical data can end up lost or stolen. Ongoing systems can come crashing down, crushing your lines of business.

IT Briefcase Exclusive Interview: In the New Age of Ecommerce, Fulfillment is the New Battleground

August 8, 2017 No Comments

with Arun Rao, GrandCanalsIn this interview, Arun Rao discusses how to support businesses who are struggling with the “Amazonification” of the fulfillment chain where there are rising costs and rising expectations on delivery times. Read More >>>

IT Briefcase Interview: Preparing Effectively for a Cloud Migration

August 4, 2017 No Comments

with Peter Kraatz, DatalinkIn this interview, Peter Kraatz at Datalink shares his expertise on the due diligence necessary for organizations to successfully move to the cloud and the challenges IT professionals should prepare for prior to a cloud migration. Read More >>>

New Survey Reveals the Benefits of Integrating Security and DevOps

August 1, 2017 No Comments

DevOps might be the best thing to happen to application security. Although, admittedly, some IT security professionals may not feel that way. First, organizations started connecting their systems and employees to the Internet. Then the introduction of the smartphone launched the BYOD trend, followed by the maturation of cloud computing-based applications and services. These developments created significant new security risks.

Research results provide insight into current DevOps security practices at both large and mid-sized enterprises.

August 1, 2017 No Comments

Research results provide insight into current DevOps security practices at both large and mid-sized enterprises.

IDG Research Services polled IT & security decision makers to gauge their organizations’ application security strategies.

August 1, 2017 No Comments

IDG Research Services polled IT & security decision makers to gauge their organizations’ application security strategies.

DATA and ANALYTICS , DATA SECURITY, Featured White Papers

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

July 27, 2017 No Comments

with Srivats Ramaswami, 42QIn this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages in efficiency and cost. Read More >>>

The Ultimate Guide to Container Security

July 24, 2017 No Comments

Securing any type of software environment is a big task. But if you use containers, constructing and enforcing a solid security program can be especially difficult. That’s because a containerized environment involves so many different layers as compared to other types of infrastructure. With virtual machines, you have only a host operating system (OS), a guest OS, and a guest application environment to secure. On bare metal, and in most types of cloud-based environments, the security situation is even simpler because there are fewer layers of software.

On the Dock and on the Books – Paying Ransom to Law-Breaking Hackers

July 19, 2017 No Comments

So-called “ransomware” has been making headlines again, most recently with the WannaCry malware. The computer code encrypts files on computers, making them inaccessible to the owners. A certain sum of money, usually in the form of Bitcoin, is demanded by the attacker in exchange for being sent the “key” needed to decrypt the files. The malware can infiltrate any type of device connected to the internet: servers, desktop computers and laptops, even smartphones.

IT Briefcase Exclusive Interview: Become a Cloud Catalyst, Not a Cloud Road Block

July 19, 2017 No Comments

with Brian Kelly, CloudGenaIn this interview, Brian Kelly, CEO & Founder of CloudGenera provides insights on the current challenges in selecting the right cloud solution to satisfy businesses specific individual needs, and how CloudGenera is helping companies, like Hewlett Packard Enterprise (HPE), overcome them. Read More >>>

IT Briefcase Exclusive Interview: Cloud Security Jiu-Jitsu

July 19, 2017 No Comments

with Jack Kudale, LaceworkIn this interview, Lacework CEO Jack Kudale discusses the challenges of cloud computing today and how to overcome cloud security challenges. Read More >>>

First Comes Cyberattacks, Then Comes Business Losses

July 17, 2017 No Comments

Any business that is at the receiving end of a cyberattack will have its fill of distractions to stem the course of the attack while recovering lost or frozen data and mollifying customers whose personal information might have been compromised. Many targeted businesses, however, subsequently discover that a cyberattack and its consequences are only the beginning of their problems.

IT Briefcase Exclusive Interview: How All-flash Storage Helps Retailers Stay Competitive

July 12, 2017 No Comments

with Sundip Arora, KaminarioIn this interview, Kaminario, shares his take on how this rapid increase in retail technology means retailers must implement a solid storage backbone to handle the exponential growth of data and stay ahead of their competition. Read More >>>

IT Briefcase Exclusive Interview: How Automation and Machine Learning Are Solving the Technology Staffing Crunch

July 11, 2017 No Comments

with Gabby Nizri, AyehuIn this interview,Gabby Nizri, Co-Founder and CEO of Ayehu Inc., discusses how automation, machine learning and artificial intelligence are being used as a force multiplier to help organizations overcome the staffing crunch and operate at peak performance. Read More >>>

IT Briefcase Exclusive Interview: Digital Collaboration – Shaping the Enterprise’s Evolution

June 29, 2017 No Comments

with Daisy Hernandez, SAPIn this interview, VP of Product Management for SAP Jam Collaboration, Daisy Hernandez, shares her thoughts on how the adoption and application of digital collaboration are shaping the evolution of the enterprise. Read More >>>

IT Briefcase Exclusive Interview: Internet Connected Devices and Data Protection in SMBs

June 29, 2017 No Comments

Businesses continue to see an uptick in IoT devices used within the office, but often times are not taking the appropriate measures to track and secure these seemingly innocuous devices. Andrew Newman, CEO and founder of Reason Software Company, shares his insight on internet connected devices in small-to-medium businesses and how these companies can keep themselves protected from IoT-based attacks.

Internet privacy…is it a thing anymore?

June 28, 2017 No Comments

Edward Snowden’s leak about massive government surveillance happened almost four years ago, but the debate about internet privacy is far from over. Net neutrality is under threat, and Internet Service Providers (ISPs) work to collect and share your data with the US government. The UK government has repeatedly called for investigation into encrypted messaging platforms like WhatsApp. The internet we all know and love is under threat.

New Research Shows Cybersecurity Battleground Shifting to Linux and Web Servers

June 27, 2017 No Comments

WatchGuard® Technologies, a leader in advanced network security solutions, today announced the findings of its quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. Among its most notable findings, the report revealed that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017.

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

June 27, 2017 No Comments

with Sander Barens, ExpereoIn this interview, Sander Barens discusses new solutions and evolutions driving internet into exciting places today and keeping enterprise business ahead of the game, from managed internet networks to SD-WAN services. Read More >>>

IT Briefcase Exclusive Interview: Driving Data Decisions Throughout the Development Lifecycle

June 27, 2017 No Comments

with Keith Fenech, RevulyticsIn this interview, Keith Fenech, VP, Software Analytics at Revulytics, speaks with IT Briefcase on how collecting and analyzing software usage data can help developers make faster, more efficient decisions at all stages of the development lifecycle. Read More >>>

IT Briefcase Exclusive Interview: The Evolution of The IoT and Data Management

June 26, 2017 No Comments

In today’s always-on, connected world, exponential data growth driven by the Internet of Things (IoT) is placing unprecedented demands on the data center, and current IT environments are struggling to handle the influx. To address continuously changing data center needs, IT managers are turning to converged and hyperconverged solutions to simply and quickly deploy IT.

Wireless Sensor Networks: What IT Needs to Know to Successfully Manage Them

June 20, 2017 No Comments

In addition to contributing to the exponential increase in data, security concerns, and strain on enterprise networks, the growth of the Internet of Things (IoT) is creating demand for upgraded wireless sensor nodes in the enterprise. And as IoT becomes more prevalent in the enterprise, the ease with which we as IT professionals can deploy and create sensor networks increases in tandem.

DevOps & Security: Top 4 Myths Debunked

June 20, 2017 No Comments

In DevOps, when you’re deploying hundreds, possibly thousands, of features and bug fixes a week, security cannot afford to be an afterthought. The beautiful thing about DevOps is that it is a process that continues to get more streamlined, faster and efficient – and deployments will be that much better if they are also fully secure before release time comes.

IT Briefcase Exclusive Interview: Heuristics, Virtualization and the Future of Web Application Protection

June 16, 2017 No Comments

with James E. Lee, WaratekIn this interview, an expert in data privacy and security, Waratek EVP James E. Lee dives into a common method of protection in web application security, why it’s problematic and where the industry is headed. Read More >>>

3 Cybersecurity Trends to Watch for in 2017

June 15, 2017 No Comments

Although the internet is one of the greatest game changers of the 20th century, it comes with its own share of issues. Security breaches have continued to plague the cyberspace, leading to losses of billions of dollars. In fact, according to Forbes, cybercrime is expected to have cost the US economy $2 trillion by 2019. And what’s more frightening is that there appears to be no definite solution to cybercrime in sight. In fact, the advent of the IoT is expected to make cybersecurity even more difficult to enforce.

PLAYING DEFENSE AGAINST HACKERS IS LIKE A NINE-INNING BASEBALL GAME

June 15, 2017 No Comments

In baseball, there are few plays more exhilarating, more memorable and more impactful on the final score than a long home run. But, as any fan can tell you, home runs aren’t the only way to take down an opponent. In baseball there are plenty of ways to score. Some of them aren’t as picturesque as a long ball, but they all inflict certain degrees of damage. Defenses have to do their best to prepare for every occurence and prevent the other team from scoring.

Seven DLP Features to Help Maximize Data Protection

June 14, 2017 No Comments

It’s a familiar refrain: Cloud services and mobile devices have made the challenges of safeguarding company data even more acute. Sensitive information now travels far beyond the relative safety of in-house networks into consumer cloud storage services where it’s accessed by employees using unsecured mobile devices. Yet while these risks are well understood, the number of data breaches continues to rise.

No Summer Vacation for Cybersecurity

June 14, 2017 No Comments

We all wait for the summer to take some time off, unwind and recharge. And while summertime might be downtime for you, that’s not the case for cyber-attacks, which are increasing in an alarming rate: from the most recent ransomware attack using the WannaCry computer worm, which crippled operations worldwide, to sophisticated nation-state activities, attacks directly on banks such as the SWIFT attack, and new areas such as the DDoS attacks using IoT botnets.

Infographic: Out with the Old, In With the New

June 5, 2017 No Comments

Sixty Nine percent of businesses have security solutions that are outdated and inadequate. View Infographic

ADVERTISEMENT

DTX ExCeL London

WomeninTech