Inside the Briefcase






Briefcase Highlights


DATA SECURITY

IT Briefcase Exclusive Interview: Hottest Trends for Government IT Leaders in 2016

February 4, 2016 No Comments

with Chadd Kenney, Pure StorageIn this interview, Chad Kenney discusses how critical laying strategic foundational IT infrastructure is for success in the short-term and over the long haul. Read More >>>

SECURITY LEADERSHIP SERIES EBOOK: Security Strategies for Success

February 2, 2016 No Comments

Are you protecting the information that matters most? In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for security. For IT leaders, these security strategies for success are essential reading. Get started today.

Think You’re More Secure than Instagram? A Cyber Security Q&A with Dyadic Chief Scientist Yehuda Lindell

January 29, 2016 No Comments

An independent security researcherwas recently able to infiltrate Instagram’s servers and gain access to essentially every secret key and server. The level of access he was able to achieve in a short amount of time is shocking: once he gained access to the company’s SSL certificates, private keys and administrator credentials, everything was open to him. He was able to access company assets, such as source code and internal emails, as well as private customer data, including personal details, login credentials and images.

The Access and Identity Market Is Growing: Here’s Why

January 28, 2016 No Comments

by Dean Wiech, Tools4everWhile as a whole, the IAM market has been growing, there have been certain areas and solutions that have, in particular, shown great growth. What are these and why have organizations of all sizes been implementing them? Read More >>>

All About Identity: Collection of IT Trends and Best Practices

January 28, 2016 No Comments

Equip yourself with knowledge of today’s enterprise cyberthreats and security best practices by downloading the All About Identity eBook.

Rising Rates of Cyber Shoplifting Causing Innocent E-tailers to Lose Their Bank Approval

January 22, 2016 No Comments

While technology has benefited retailers in many ways, it has also contributed to growing levels of fraud. Although EMV and other developments are helping to curb identity theft fraud and unauthorized transactions, “chargeback fraud” remains a major threat to eCommerce merchants. As the technology of electronic payment processing becomes nearly ubiquitous in the business world, online shopping is rapidly overtaking in-store sales for many items. But with any fast-evolving system, scammers find loopholes that can eat deeply into profits.

2015 Cyberthreat Defense Report – Executive Summary

January 20, 2016 No Comments

Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.

Securing the Network in an Era of Digital Transformation

January 19, 2016 No Comments

Digital transformation comprises all the changes occurring due to the application of digital technology in all aspects of society. BYOD, IoT, advanced cyber attacks – everything’s happening at an accelerated pace, and only the science fiction writers can guess what’s next on the horizon. One thing that is certain, though, is that the current proliferation of end points requires diamond-sharp clarity about which network solutions will provide a holistic, real-time view of the network.

Are You the Next Weakest Link?

January 12, 2016 No Comments

Most of us remember the myth of the Trojan War, when the Greeks attempted to defeat the city of Troy. The battles lasted nearly 10 years. Then one day the Greeks appeared to retreat, leaving behind a huge wooden horse as a gift to the Trojans. The Trojan Horse was brought inside the city gates allowing the enclosed Greek warriors to infiltrate the city. The Greek warriors opened the city gates to allow the rest of their army to enter and defeat Troy.

10 Cyber Security Predictions for 2016

January 11, 2016 No Comments

Gazing into the crystal ball for the coming 12 months, remember, the future ain’t what it used to be. It’s already here, but unevenly distributed. Good riddance of terrible 2015 which was the year of the data breach.

451 Research: 44% of Enterprises will increase Information Security spending, but staffing obstacles hamper SIEM implementations

January 7, 2016 No Comments

According to 451 Research’s new Voice of the Enterprise: Information Security quarterly study, more than 32% of the enterprises surveyed name Splunk as their primary Security Information and Event Management (SIEM) platform provider. In the 451 Research Vendor Window™, enterprises rated Splunk highest especially for querying capability and the ease of integrating new data feeds. Intel Security is the second highest rated vendor based on evaluations from its 380 existing customers.

Beef up your information security before you go shopping for cyber insurance

January 7, 2016 No Comments

Insurance is all about risk management. Like with any policy, a cyber security insurance policy is cheaper if you never have to use it. Unfortunately, in recent years, there has been a big uptick in cyber security attacks. This is pushing the cost of this type of insurance up dramatically and causing many insurance companies to cap coverage at $100 million.

Trends Disrupting the Security Market

January 5, 2016 No Comments

Today there are various factors influencing the direction of security solutions over the next 5 years including. Watch this webcast to learn the trends disrupting the security market.

Here’s the Long-Awaited ‘Silver Bullet’ for Data Security: Plain Old Elbow Grease

January 1, 2016 No Comments

By Joe McKendrick, Author and Independent ResearcherVerizon just released the latest edition of its annual Data Breach Investigations Report, and it reveals that most data security breaches don’t have to happen – yet, they still do keep on taking place. Read More >>>

Spiceworks Report: IT trends 2016

December 28, 2015 No Comments

Glorium Technologies knows that plenty of people are interested in what to wait for in the IT world in 2016. That’s why, we decided to prepare infographic based upon Spicework report. Enjoy!

IT Briefcase Exclusive Interview: BYOD Holiday Hazards for Popular Shopping Apps

December 17, 2015 No Comments

with Maureen Polte, Flexera SoftwareIn this interview, Maureen Polte from Flexera Software discusses why it’s important for enterprises to understand the risky behaviors associated with mobile apps that could compromise data security in today’s BYOD environment. Read More >>>

Keeping the Connected Car Safe from Today’s Most Malicious Cyber Breaches: the Attacks and Defense OEMs Need to Know

December 17, 2015 No Comments

The demand to stay connected while driving is steadily growing and car manufacturers are keen to provide better and more innovative connected services to differentiate their brands and stay ahead of the competition. This is a global phenomenon, especially with Gen-Y car buyers who are used to a digitally connected lifestyle. In fact, some research indicates that a quarter billion of cars will be connected to the internet by 2020 (source: Gartner).

How Enterprises Are Beefing Up Wireless Security

December 15, 2015 No Comments

Wireless network is a valuable asset to a business that embraces the technology. It is, indeed, inexpensive and easy to set up and operate. The wireless network has undoubtedly increased enterprises’ performance and productivity. By having a central point of distribution, that entails the installation of a wireless adapter, a business can access the network from any part within the premises. Sharing of documents and hardware components such as printers, scanners, and photocopiers become a very smooth and efficient process. All the clutter and nightmare that comes with physically connecting all the computers and their peripherals is made almost non-existent, except for the few power cable needed here and there.

After a Breach, Forget the Who and Focus on the How and the What

December 9, 2015 No Comments

The $400 million of estimated losses from the 700 million records compromised in 2014, detailed in Verizon’s 2015 Data Breach Investigations Report, sends a collective shudder down the spines of organizations’ C-suites and IT departments. If, after creating what seems like a foolproof security strategy, the organization suffers a breach, the focus of attention oftentimes goes not to how the breach occurred but to who did it. Money and reputation are about to be lost, and someone is to blame.

The Essential Guide to Crafting A Business Recovery Plan

December 7, 2015 No Comments

Download this simple guide to protect your entire business when an outage occurs.

Don’t Leave Your Keys Exposed: Focusing on Access Control

December 7, 2015 No Comments

Access is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Being able to properly control access means the difference between a breach and brand reputation. These days, access is about more than just network passwords. It extends well beyond the borders of the enterprise. Global supply chains are increasingly complex. The global supply chain is intertwined intimately, and it doesn’t seem it will unravel itself anytime soon.

IT Briefcase Exclusive Interview with Learning@Cisco: New Training Needed to Manage the Internet of Everything

December 2, 2015 No Comments

with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>

Introducing the New Retail BRAIN

November 24, 2015 No Comments

This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.

Chip Cards Offer Additional Security for Holiday Shopping Season

November 23, 2015 No Comments

As the holiday shopping season approaches, the American Bankers Association is educating consumers about the new chip technology embedded in many credit and debit cards. The new chip cards offers bank customers an added layer of security just in time for the holidays. The chip – a small metallic square on the front of the payment card – assigns a one-time code for each transaction, and makes it nearly impossible for fraudsters to create counterfeit cards.

New Cybrary Mobile App Provides Hacking Training to Developing Nations with Limited Web Access

November 19, 2015 No Comments

Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access – particularly in developing countries – to learn hacking, forensics and other cyber security skills on the go.

Is Online Credit Card Fraud About to Increase?

November 12, 2015 No Comments

Chip and PIN cards are nothing new. For several years, retailers in Europe have accepted the cards, which transmit information about the transaction to the payment processor, including the card number and account details, via a secure token or one-time use code. These codes are practically useless to hackers, thereby protecting credit card users from having their financial data stolen. The cards themselves contain a chip, which when inserted into a special reader, makes the conversion; in order to complete the transaction, the customer must enter a PIN, instead of a signature.

IT Briefcase Exclusive Interview: Navigating Threat Mitigation

November 11, 2015 No Comments

Nikhil Premanandan, ManageEngineIn this interview, Nikhil Premanandan from ManageEngine discusses the importance of notifying DBAs the moment any anomalous activity is detected and finding the root cause, enabling a faster threat mitigation response. Read More >>>

Barbarians at the Gate: Enhancing Web Security with Behavioural Analytics

November 11, 2015 No Comments

Cybercrime is thriving … as demonstrated by several high-profile, online data breaches in the press recently. As static, on-premise security measures are increasingly becoming ineffective against attempts to steal data and take web services offline, many security professionals are left unsure how to best mitigate these evolving threats.

International Borders Mean Nothing When It Comes To Computer Hackers

November 11, 2015 No Comments

Data breaches have become so commonplace that we almost expect them. Credit cards are compromised when retail stores are hacked. Social Security numbers are at risk when government agencies or physician’s offices fall prey to phishing expeditions. And those are just the perils the average American faces with domestic hackers. It’s just as easy for people from far-flung countries – some of whom may be working on the behest of their governments – to infiltrate our computer systems and disrupt our way of life.

Hardware Encryption Market is Expected to Reach $296.4 Billion, Worldwide, By 2020

November 9, 2015 No Comments

A new report by Allied Market Research titled, “World Hardware Encryption—Market Opportunities and Forecasts, 2014–2020” forecasts that the world hardware encryption market would garner revenue of $296.4 billion by 2020, registering a CAGR of 54.6% during the forecast period of 2015–2020. Hard disk drives are the most widely encrypted devices, accounting for the highest market share throughout analysis period. Asia-Pacific is the largest revenue generating region for hardware encryption, followed by North America and Europe.

ADVERTISEMENT

DTX ExCeL London

WomeninTech