Inside the Briefcase


IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

with Shashi Kiran, Quali
IT Briefcase conducted the following Q&A with Quali Chief Marketing Officer Shashi Kiran to get a better understanding about the beneficial uses of cloud sandboxes as the DevOps trend continues to take hold and gain...

Preparing for the Adoption of Office 365

Preparing for the Adoption of Office 365

As you may know, Microsoft Office 365 is the number one cloud-based solution, due to its appeal on multiple levels to individuals and business users alike. In recent years, Microsoft has invested heavily in cloud computing, with its revenue...





Briefcase Highlights


DATA SECURITY

Why WoSign and StartCom Bad SSL Certificate Are an Issue

November 17, 2016 No Comments

If your organization has any website or web application presence on the internet, there’s a chance that you’re using SSL certificates from Certificate Authorities WoSign and Startcom. But as a CISO or security leader, the news that Mozilla, the world’s second most popular browser, cited “technical and management failures” on behalf of WoSign in its decision to distrust future certificates chaining up to the currently-included WoSign and StartCom root certificates, should spur some InfoSec introspection. You may be facing unseen escalated levels of digital risk and may need to take action.

What We Can Learn From the Recent Massive DDoS Attack

November 15, 2016 No Comments

While distributed denial-of-service (DDoS) attacks are nothing new, the scale of one of the most recent ones was truly something to behold. If you woke up on October 21 to see some of your favorite websites down, that’s what happened. Experts are calling it the largest DDoS attack in history, something so massive that commenters said it broke the internet. The major geographic areas affected by the attack centered in the U.S., where regions like the Northeast, Midwest, West Coast, and Texas were hit the hardest.

Why you shouldn’t compromise website security, accessibility and functionality

November 15, 2016 No Comments

The web content management software (CMS) market has become very mature and versatile over the past decade. Although there are hundreds of providers powering more than a billion websites today, there are still large gaps in the areas of functionality, design freedom and security among existing CMS platforms, forcing users to continually compromise and re-prioritize their needs. For this reason, it’s important to ask yourself four key questions in order to choose the proper CMS for your business.

Exploring New Niches: How to Overcome the Challenges

November 14, 2016 No Comments

There are more online stores than ever as we get nearer to 2017; far more than when we experienced a dot-com boom back in 2000. People are appreciating the advantages offered by maintaining online businesses, which is why the market is saturated and very competitive.

Three Cybersecurity Tips for Black Friday – How Can Retailers Protect Their Critical Data in the Midst of the Holiday Season’s Shopping Madness?

November 10, 2016 No Comments

Black Friday and Cyber Monday are approaching quickly, which means that online traffic will skyrocket while holiday retail sales flood the internet. In some aspects, it’s a positive—online shoppers will take advantage of seasonal deals and complete their holiday shopping from the convenience of their own homes, while retailers will enjoy a considerable upsurge in sales. According to eMarketer, U.S. ecommerce sales will increase by 17.2% this holiday season. Throughout November and December, holiday retail ecommerce sales will increase to $94.71 billion, which is 10.7% of all holiday retail sales—the largest percentage to date.

The State of U.S. Federal Cybersecurity in 2016

November 3, 2016 No Comments

One malicious email can, and has, jeopardized the sensitive data of countless U.S. civilians. How? Federal agencies collect and store some of the most sensitive and top secret data. This data ranges from top secret defense IP’s in the Department of Defense (DOD), current and former federal employee personal records at the Office of Personnel Management (OPM), the hypersensitive data found in the Department of Homeland Security (DHS) and, according to the 2016 Federal Information Security Modernization Act produced by the Office of Management and Budget (OMB), many of these agencies need to be doing much more to protect their sensitive data.

Top Five Practices to Ensure Agility in Your IT Service Desk

October 27, 2016 No Comments

The agile approach is everywhere. Born in the software development world, agility means adaptive planning, ongoing development and continuous improvement. Rapid and flexible response to change is critical. It is not surprising that the best practices of agile software development penetrated into other areas, and ITSM is no exception. Unless you’ve been away from ITSM for the last 10 years, you know that an agile IT service desk is flexible, automates processes for quicker incident resolution, and emphasizes collaboration between technicians and interaction with end users.

Creating a Security Culture in the Age of Digital Transformation

October 27, 2016 No Comments

Enterprises are embracing the shift to becoming digital as the fast pace of business now demands a frictionless sharing experience.The “Digital Transformation Agenda 2016” report from The Economist Intelligence Unit revealed that 77 percent of those surveyed agreed somewhat or strongly that digital transformation is their number one priority. However, 46 percent felt their organization would need to make significant changes to meet their goals.

Business Continuity: Top Tips For Dodging Disruptions

October 26, 2016 No Comments

Are you prepared for a network outage? Many companies have invested heavily in disaster-recovery solutions designed to mitigate the effects of catastrophic storms, earthquakes or power outages. However, Information Age notes that the cause of disruptions isn’t always so obvious — software updates gone awry or day-to-day human errors can also precipitate continuity problems. Here are five tips to help your company dodge network disruptions.

The Hidden Danger Threatening Your Compliance Profile

October 26, 2016 No Comments

It seems like a simple enough question, but it’s one that rarely has a satisfactory answer: Who is accountable for SSH-related, key-based access in your organization? Not knowing the answer leaves organizations open to potentially serious security and compliance issues. Without clear ownership and consistent policies for SSH key management, organizations make assumptions that can lead to disaster. This article will focus on the challenge of SSH user key-based access from the perspective of compliance. It’s ultimately all about access control. All the regulations, laws and frameworks exist to ensure, at a minimum, that protected data (PII, ePHI, credit card data, etc.) has authorized access.

Government Asks: What’s in Your Software?

October 19, 2016 No Comments

Multiple agencies across the U.S. government are paying closer attention to the software they are buying. More specifically, they want to know what open source and third party components were used to build the software applications. Read this article to learn more about this report

Why Business Travelers Are Vulnerable Targets for Cyber Attacks and How to Stop Them

October 19, 2016 No Comments

Traveling can be an eye-opening and life-enriching experience for those who partake in it. There is, however, certain dangers and precautions which must be taken in consideration when traveling, especially as a business traveler. One such consideration is that business travelers are especially vulnerable to cyber attacks while traveling. While this may be shocking to hear, the truth is undeniable. There are, however, certain measures that a business traveler can take to ensure that valuable data is not stolen. Before security measures are related, it is beneficial to understand how these attacks are occurring.

Convincing C-Level Executives of the Importance of Cloud Security

October 18, 2016 No Comments

As you probably know, convincing executives about anything can be extremely difficult in business. They are often disconnected from the way things actually are in the lower levels of the company, and when it comes to topics such as cloud computing, they may not have any knowledge at all. Convincing these executives about how important security is in the cloud can be very difficult, but it can be done. Here are a few tips on how to get it through to these c-suite employees.

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

October 17, 2016 No Comments

with Shashi Kiran, QualiIT Briefcase conducted the following Q&A with Quali Chief Marketing Officer Shashi Kiran to get a better understanding about the beneficial uses of cloud sandboxes as the DevOps trend continues to take hold and gain industry momentum. Read More >>>

The Connection Between eCommerce and Online Security

October 17, 2016 No Comments

It wouldn’t be an exaggeration to say that eCommerce has completely revolutionized the world of retail as we know it. Instead of going to a store and browsing through the limited number of items they have in offer, you now have the opportunity to log-in onto your e-store account and buy anything you like. Unlike with real stores where you would have to travel to a different location (which also adds to the price of the purchased product) all you have to do here is open a new tab in your browser.

Problem Solving Current Electronic Product Development Challenges

October 13, 2016 No Comments

Consumer electronics market is larger and more competitive than ever, so the products that are developed must have eye catching style, the latest technology and a competitive price to be successful.

Most Useful Mobile Technology in Today’s Market

October 11, 2016 No Comments

It seems as though the world has gone mobile. Everywhere you look someone has their smartphone out doing everything from playing Pokémon Go to shopping on the QVC online store. From texting to checking Facebook to keeping abreast of the news and weather forecasts, there is always something to do and see on that handy little gadget we wouldn’t leave home without. Not only are our cell phones a source of entertainment, but also a source of information and even function.

Five Tools and Technologies to Help Manage Social Business Risks

October 11, 2016 No Comments

Social media has become a powerful business channel for companies of all types and sizes. However, with great benefits come great responsibilities. These platforms will help you obtain brand awareness and authority, but once you use them, you will be inevitably prone to risks. So, together with a concise and persuasive social media campaign, you will also find the following five tools and technologies useful to manage your business risks.

Survey Reveals Insights into How Enterprises Approach Analytics

October 5, 2016 No Comments

For quite some time, the majority of enterprise business intelligence (BI) investments and implementations have focused on internal processes and users. However, when Jinfonet surveyed more than 400 senior IT and business professionals about their BI and analytics practices, 67 percent said they were serving external customers. Yet a large percentage of external customers still don’t have access to the analytics they need, because the cost to deploy them stands in the way.

Preparing for the Adoption of Office 365

October 3, 2016 No Comments

As you may know, Microsoft Office 365 is the number one cloud-based solution, due to its appeal on multiple levels to individuals and business users alike. In recent years, Microsoft has invested heavily in cloud computing, with its revenue from Office 365 jumping 54 percent over the last quarter.

Your First Custom App: Getting Started

September 27, 2016 No Comments

Every day, organizations and individuals are experiencing the power of custom apps to improve productivity, increase efficiency and achieve desired outcomes. For those uninitiated, getting your first custom app off the ground can be intimidating. However, there are a few concrete steps that you can take to move your idea from imagination to implementation. These steps and core concepts have been distilled from the best practices of many people – and teams – who have planned their own custom apps and are using them to their advantage. By following these steps, you’ll be harnessing the power of custom apps in no time.

IT professionals need skills mix to address emerging network and data security demands

September 22, 2016 No Comments

Once upon a time in IT, it was enough to build a strong high wall around the enterprise garden. Build it sturdy enough, and the organization’s network and information would be safe. These days, the wall alone will not work. The modern approach goes far beyond simple architecture and perimeter controls. It mandates an additional focus on security operations, which includes making all employees, regardless of job title, part of the security effort. Cybercriminals are no longer just clawing at the front door. They are undermining bricks, tunneling under walls and launching Trojan horses.

Why Data Security Is Key for Customer Retention

September 21, 2016 No Comments

Tweet Featured article by Thea Millard, Market Data Analyst Customer care can be the defining factor that makes a difference between a successful company and a failing one. All other tasks and activities derive from the connection between product and client. Marketing may be the most volatile field in business, but one thing is always […]

5 Ways to Prevent Data Breaches

September 19, 2016 No Comments

In a world where data is one of the most valuable assets a business and individual has, security breaches have become increasingly common. Better hardware and software tools for deterrence are being developed, but so are the malware and methods being used to punch holes through them. As a business owner, you have to accept the unfortunate reality that threats no longer just exist in physical form. A digital war between good and evil is transpiring as we speak and it is your duty to make sure your castle is well-prepared to defend its treasures of data. Here are five ways to prevent data breaches.

How Companies Can Ensure Stronger Mobile Security

September 15, 2016 No Comments

The modern business environment has upended some long-standing traditions. Many employees are now expected to work not just at the office from their desktops, but from home as well, on devices like smartphones, laptops, and tablets. The BYOD phenomenon has transformed industries across the country, as employees are now always in reach. As a result, the traditional 9-to-5 work day is quickly becoming blurred.

PaaS Adoption Inevitable for Most Applications

September 14, 2016 No Comments

I am increasingly convinced that the eventual adoption of Platform as a Service (PaaS) offerings is inevitable for most applications even if the number of applications built on top of PaaS offerings is relatively low today. What do I mean by PaaS? Services that sit above the more traditional Infrastructure as a Service (IaaS) that most people today equate with cloud computing.

Wikibon Cube Conversation: Modernizing Data Protection

September 14, 2016 No Comments

A fundamental goal of any IT organization should be to protect, preserve and serve data and information in a cost-effective as well as productive way. This webcast discusses ways in which today’s organizations can safely and securely modernize their data protection within the context of the Wikibon Cube Conversation.

ESG Video Interview Webinar: IBM Data Protection Modernization and Strategy

September 14, 2016 No Comments

In this webcast, Enterprise Strategy Group Principal Analyst, Jason Buffington, and IBM Senior Technical Staff Member, Greg Van Hise discuss a range of data protection modernization issues that businesses are facing today, and strategies to help overcome these challenges.

From Car-Jacking to Car-Hacking: How Vehicles Became Targets For Cybercriminals

September 12, 2016 No Comments

As cars are “smarter,” protecting them requires more than locking the doors and closing the windows. Electronic entry, Wi-Fi, computer sensors that enable self-driving or automatic stopping measures, and on-board global positioning systems can encourage safer driving. Cars are also equipped to record data that can reveal safety problems in the car or how a crash occurred. An estimated 95 percent of auto crashes involve human error.

Information Security and Data Privacy Practices

September 6, 2016 No Comments

This white paper discusses several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.

ADVERTISEMENT

DTX ExCeL London

WomeninTech