Inside the Briefcase


IT Briefcase Exclusive Interview: As Container Adoption Swells, So Do Security Concerns

IT Briefcase Exclusive Interview: As Container Adoption Swells, So Do Security Concerns

Fei Huang, NeuVector
In this Fresh Ink interview segment, we talk to NeuVector CEO Fei Huang about the most pressing container security concerns and strategies to mitigate them.
Read More >>>





Briefcase Highlights


DATA SECURITY

Everything You Need to Know About Office 365 Email Encryption

March 21, 2017 No Comments

It is vital that every company, regardless of how big or small, takes the appropriate steps to secure their valuable data. From intellectual property to financial information, a cybercriminal has the knowledge and resources to target any vulnerable company at any time. To help you successfully protect your organisation, we are offering a helpful guide to Microsoft Office 365 email encryption.

The Future of IT Troubleshooting

March 21, 2017 No Comments

A common approach to addressing any number of performance issues in IT environments is to throw a bunch of potential solutions at the wall and see what sticks. However, IT environments are becoming increasingly complex and varied, making the dart-on-the-wall strategy even less effective than it already was. As such, here I will cover what IT troubleshooting should look like in the hybrid IT world we now find ourselves in, and will continue to be encompassed by into the future.

Struts2 Exploited Again – Did Anyone Bother to Tell You?

March 21, 2017 No Comments

This week we saw the announcement of yet another Struts 2 Remote Code Exploit (RCE) vulnerability. What’s notable about this instance is that POC code seems to have been released into the wild either just before, or immediately after the disclosure. As was the case with previous Struts1 vulnerabilities, exploits are being observed at large scale in the wild.

IT Briefcase Exclusive Interview: As Container Adoption Swells, So Do Security Concerns

March 21, 2017 No Comments

Fei Huang, NeuVectorIn this Fresh Ink interview segment, we talk to NeuVector CEO Fei Huang about the most pressing container security concerns and strategies to mitigate them. Read More >>>

How Safe is Your Business Website from Hackers?

March 9, 2017 No Comments

2016 was a great year for hackers. The Kremlin was accused of hacking the US presidential election and Yahoo was forced to admit it had been the victim of hackers, not once but twice. There was also a huge rise in the use of Ransomware, where hackers extort money from businesses in return for unencrypting their files. At one point, security software provider Malwarebytes declared that 50% of all US businesses had been hit by ransomware.

IBM Security Case Study: Office of the CIO

March 8, 2017 No Comments

When your workforce is often on the move, it can be a challenge for them to readily access information safely. Read this case study and find out how IBM makes it easier for teams to work with content, without compromising security.

Box: Securing Business Information in the Cloud

March 8, 2017 No Comments

The rise of mobility cloud services, and service oriented platforms have created immense value for IT end users, but adapting security controls to protect sensitive content in this highly decentralized architecture has proven difficult. 

Cloud Security for Enterprises

March 3, 2017 No Comments

Enterprises have begun to move to the cloud as security concerns are remedied and the value of cloud services are realized by businesses. Traditionally, enterprises have been more heavily scaled on the Microsoft infrastructure than small and midsize businesses (SMB). In the past many SMBs worked primarily with third parties and non-Microsoft technologies. That trend is now changing as larger providers develop offerings catered to SMBs.

Celebrating Security Every Day of the Year

March 3, 2017 No Comments

Did you know that Safer Internet Day is celebrated during the month of February, to remind us of the importance of data security? It’s a worthy holiday, but I’d like to remind you that securing your infrastructure and data should be a focal point for both you and your IT department not just for one day, but all year. There’s perhaps no better evidence of this fact than taking a look back at some of the most prominent security incidents of 2016, which ended up being a very eventful year in cybersecurity.

How Business Intelligence Has Evolved Over the Last Few Decades

February 28, 2017 No Comments

It’s unprecedented the way business intelligence (BI) has evolved over the course of several decades. In your parents’ and grandparents’ generation, data was limited to sales numbers and a few other broad metrics. Today, that has all changed due to the breakout of new key performance indicators made possible through advancements in BI.

Small Business Cybersecurity Protection + Best Practices

February 24, 2017 No Comments

Following the weak link concept, another essential when starting out is setting unique accounts for each company individual, along with granular access permissions. Unfortunately, although malicious insiders are not the most common form of attack, they are one of the most difficult to detect, with most internal breaches taking months to discover. These attacks are overwhelmingly carried out through employees abusing account privileges that they shouldn’t have had in the first place.

Toxic Links: Why They Matter And How To Find And Remove Them

February 23, 2017 No Comments

Toxic links can drag a site down in the SERPs and elicit manual penalties. We look at what toxic links are, how to find them, and the steps for safe removal.

Security Considerations for Intelligent WAN (IWAN)

February 20, 2017 No Comments

Lower cost Internet connections have become more reliable and cost less than dedicated links. Cisco® Intelligent WAN (IWAN) solution gives you a way to take advantage of cheaper bandwidth at branch locations, without compromising application performance, availability, or security.

5 Trends And Factors That Continue To Impact Cyber Security In 2017

February 20, 2017 No Comments

It’s become news that’s not unexpected any more. We awaken to learn that yet another national retailer has been hacked and once again credit-card information for millions of customers is at risk. Yet, despite all the publicity these security breaches receive and all the warning consumers hear, cyber criminals still achieve success and seem more brazen than ever.

Ignoring DNS Security Carries Serious Consequences for Business

February 8, 2017 No Comments

At the end of last year, executives around the globe sat around boardrooms finalizing budgets and prioritizing IT investments. Without a doubt cybersecurity was at the top of every business’ agenda. But, as we move into 2017, the risk is only growing and organizations need to ask themselves: do they really know where the danger lies and furthermore, are they doing the right thing to protect themselves from cyberattacks?

Understanding 2017’s Top Cloud Security Risks and How to Protect Your Data

February 2, 2017 No Comments

As the cloud becomes a more popular medium for individuals and businesses alike, many people are searching for new ways to break through cloud security and acquire more information. In order to ensure that you and your data are protected, you must understand the security risks and implement methods to protect your data that is stored in the cloud. Since over 70 percent of businesses operate in the cloud, it is more important than ever for those businesses and their customers to take the necessary precautions to protect and backup cloud data.

Outstanding Tips for Protecting the Online Accounts Using Secure Strong Password

January 30, 2017 No Comments

Most people are using the social media sites and other sites regularly to get updated information. In fact, each of them should require a strong password which is meant for protection purpose. Having a secure and unique password for each online account is critically a necessary one forever. It begins to access your account quickly by entering the secure password in it. This is the positive step for accessing the account by having a password for your account.

From Weaponized Homes to new DevSecOps Jobs: Security Trends for 2017

January 30, 2017 No Comments

As we ring in the new year for 2017, there’s plenty of uncertainty surrounding the security and privacy of our digital world. Much of this uncertainty stems from escalating intensity of cyber attacks against consumers and businesses and the evolution of the “Internet of Things” as a weaponized battlefield. As the year comes to a close and we consider what impacted the security industry in 2016, I’ve put some thought into my own perspectives as to what 2017 might hold, find my predictions for 2017 below.

A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching

January 24, 2017 No Comments

How can you better understand your actual cybersecurity standings and health? The first step is to better understand the three primary ways that your organization can experience a cybersecurity incident: insider threat, outsider threat and attacks through a supply chain.

Making Risk Management More Effective with Security Ratings

January 24, 2017 No Comments

With the growth of cyber threats and the daily reports of security breaches, cyber risk has to be high on your list of priorities for your enterprise. According to Lloyds Risk Index 20131 cyber risk is now the third biggest concern of CEOs and their senior executives, following high taxation and loss of customers.

Critical Third Parties: Exploring Data Security in the Legal Sector and Beyond

January 24, 2017 No Comments

Download this report now to discover the current state of the data security landscape in the Legal sector and learn how organizations can improve their own cybersecurity programs and vendor risk management techniques.

Three Reality Checks for Compliance and Risk Management in 2017

January 23, 2017 No Comments

As the transition to a new Presidential administration unfolds, uncertainty abounds. Predictions made about the regulatory landscape made before November may not ring as true, as Republicans look to make good on promises about smaller government and regulatory reform, particularly in banking and finance. Likewise, the potential repeal of the Affordable Care Act and significant changes to Medicare will make waves in healthcare regulation.

Privacy Goes Mainstream in 2017

January 20, 2017 No Comments

As we head in to 2017, it has become increasingly clear that privacy and security concerns have completed their jump from the board room to the living room. With citizen privacy protection being discussed more regularly, distrust is running rampant and complete security protection is no longer assumed by anyone. These changing assumptions were demonstrated just recently when the US Executive Order 12333 was put into place by departing President Obama to expand the power of the NSA to share globally intercepted personal communications with 16 other intelligence agencies before applying privacy protection

DDoS Attacks Are A Growing Risk For All Online Service Providers

January 19, 2017 No Comments

In October, a massive distributed denial of service attack seriously degraded the service of one of web’s major infrastructure providers. The web depends on DNS, and if one the big DNS providers is in trouble, that spells a bad day for the rest of the web. In this case, Twitter, Reddit, and hundreds of smaller sites and web applications were disrupted.

Two Pronged-Approach for Defending Against Ransomware Attacks

January 18, 2017 No Comments

Ransomware in IT healthcare environments continues to be an unholy menace to the day-to-day operations of hospitals. I’ve spoken with healthcare groups not just in the UK, but around the world, who have been hit at very large scales, effectively suspending all frontline digital operations in healthcare environments. It’s terrifying to consider the potential real-world physical impacts to patients when doctors and nurses are all of a sudden unable to review charts or tests in order to provide urgent care.

IDC ExpertROI® SPOTLIGHT: Symantec Delivering on Its Strategic Vision with Next-Generation Secure Datacenter Powered by Cisco ACI

January 17, 2017 No Comments

Read more to learn how Symantec delivers on its strategic vision with Next-Generation Secure Datacenter powered by Cisco ACI.

IDC Solution Brief – Assessing the Business Value of SDN Datacenter Security Solutions

January 17, 2017 No Comments

Download this paper to learn how Cisco’s ACI platform uses a policy-based automation solution to provide greater scalability, a greater network and an improvement in IT alignment with business objectives. 

The Security Problem with IT Sprawl

January 16, 2017 No Comments

Tweet Featured article by Rick DelGado, Independent Technology Author With new developments in technology, companies are desperate to stay ahead of their competitors and keep up with the higher expectations consumers are adopting. There are only so many resources to leverage, so many have decentralized their IT infrastructure, according to a VMware survey that discovered […]

Tips to Minimize the Impact of a Security Breach

January 13, 2017 No Comments

The SecureWorks Incident Management and Response team developed the following recommendations to help IT and IT security organizations minimize the duration and impact of a security breach.

Security and Risk Consulting: The Value of Penetration Testing

January 13, 2017 No Comments

The threat posed by hackers is persistent, and it is important to maintain a strong defense to protect your organization. Using real-world testing on your network determines areas where you may be vulnerable.

ADVERTISEMENT

DTX ExCeL London

WomeninTech