Inside the Briefcase


IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

Daniel Joseph Barry, Napatech
In this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.
Read More >>>

Killing Misconception: Five Steps to BPM Success

Killing Misconception: Five Steps to BPM Success

by Miguel Valdes Faura, Bonitasoft
The common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure...

7 Steps to Securely Deploy Cloud Apps

7 Steps to Securely Deploy Cloud Apps

by Chip Epps, OneLogin
Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 --constituting 60% of the user universe that will exist by then.
Read More...





Briefcase Highlights


DATA SECURITY

Will Windows 10 bring revival to its mobile platform?

July 29, 2015 No Comments

With the release of Windows 10 comes another opportunity for Microsoft to align its direction for mobile to better serve developers and IT departments. Together with a subtle name change to Windows 10 Mobile, Microsoft is looking to draw a line in the sand on its failed attempt to chase Apple in the consumer market with Windows Phone.

The Clock is Ticking on Windows Server 2003 Support

July 23, 2015 No Comments

This white paper reviews the risks facing organizations running end-of-life (EOL) platforms like Windows Server 2003 and the options available to address those risks.

Forrester Report: 21st Century Threats Demand 21st Century Security Approaches

July 23, 2015 No Comments

In June 2014, Forrester Consulting was commissioned to evaluate a shift in roles and priorities in IT security budgeting and decision-making in the wake of increased prevalence of and attention to targeted attacks and advanced threats.

Forrester Report: Best Practices For Public Cloud Security

July 23, 2015 No Comments

This paper follows “The Cloud Manager’s Balancing Act,” which describes the need for cloud managers to balance developer time-to-value with security risk and costs.

Is “Bring Your Own Device” Presenting New Threats to Cyber Security?

July 23, 2015 No Comments

In recent years there has been an increase in the number of companies allowing employees to use their own devices at work including mobiles, tablets and laptops. In fact more than just allowing it, some businesses actually encourage ‘bring your own device’ in their quest to reduce their IT overheads.

IDC Report: Server Security: Not What It Used to Be!

July 23, 2015 No Comments

This paper defines what server security is, examines how and why the server security market is growing.

Requirements Customers Have For Mobile Payments

July 22, 2015 No Comments

by Kristen Gramigna, BluePayMobile payments can equip small businesses to accept payment by credit or debit card, using the mobile device that small-business owners likely have within reach most of the time. While mobile payment technology can benefit both customer and business owner, some customers remain hesitant about them. Read More >>>

4 Steps to Achieve Strong ERP Governance & Get the Most Out of Your Investment

July 21, 2015 No Comments

Enterprise resource planning (ERP) programs are much more than the software brand that runs them — they can serve as the foundation for business success. However, the majority of companies that operate ERP systems today (no matter the platform) struggle to get the most out of their ERP investment, primarily due to issues with governance.

Ransomware Viruses: Am I Infected?

July 21, 2015 No Comments

There are so many options available for both on-site backup and cloud-based backup, there is no excuse for not executing very regular backup. To help prevent your backups being compromised, you should always have an off-site or redundant backup in place. Do not overlook the fact you should be testing that your restoration of files actually works! Always ensure you have adequate access to your backup sources and a function restoration method in place (DropBox, Google Drive and OneDrive are not set up or designed to be a backup service).

How Can MSPs Develop an Integrated Security and Management Solution? Five Best Practices

July 16, 2015 No Comments

MSPs have to delicately dance between two key priorities: constantly scanning for the latest technologies to meet their customers’ changing needs and running the numbers to see if they can afford to provide those new technologies to their customers and do it in a reliable manner. One technology service that MSPs are struggling to figure out is how to add security and systems monitoring to their business portfolios, which is in great demand.

Establishing a Foundation for Enterprise Security Policy in the Public Cloud

July 9, 2015 No Comments

In many respects, Cloud Access Security Brokers are the future of what we currently know as the data center firewall. How so? A data center firewall sits in front of enterprise applications/databases (systems of record) in the data center, providing control and visibility. Increasingly, those applications and databases are moving from the corporate data center to the public cloud – with apps like Office 365, Box, and Salesforce, quickly becoming the norm in the enterprise. In this context, cloud apps become the new system of record. Since the traditional data center firewall can’t see cloud traffic, it can no longer provide the protection that we need.

INFOGRAPHIC: Why the World Needs Better Data Security

July 8, 2015 No Comments

This infographic portrays a new paradigm shift in how enterprises must protect their corporate assets and customer information.

Your Mobile Wallet Isn’t Safe

June 29, 2015 No Comments

with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>

IT Briefcase Exclusive Interview with NuData Security: Detecting Identity Theft to Prevent Online Fraud

June 25, 2015 No Comments

with Ryan Wilk, NuData SecurityIn this interview, Ryan Wilk, director of Customer Success for NuData Security, talks speaks with IT Briefcase about just how serious data breaches can be to both the consumer and the organization, the latest trend in fraud and the best way to stop fraud before it starts. Read More >>>

Hurricane Season: Electronic Protection Tips

June 25, 2015 No Comments

June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data including accounting paperwork, employee documents and sensitive customer information, should be a priority.

Overcoming the Double Vulnerability of Open Source Software and Poor Secure Shell Key Management

June 23, 2015 No Comments

Just a handful of years after the Internet became available to the public, the need for encryption became apparent. Without a way to encrypt user information and websites, private data could be stolen by hackers. That would make online interactions unsafe, which would render online shopping and important Web-based communications (with government agencies, for instance) impossible.

Bitcoin Security Receives a Much-Needed Upgrade

June 8, 2015 No Comments

Even if you can’t quite explain what Bitcoin is or how it operates, chances are that you have at least heard of it. This leading-edge cryptocurrency has been shaking up notions of what currency is and how value is transmitted since its founding in 2008. Bitcoin is intriguing to investors, technology watchers and even a few bankers due it is blockchain technology, a transaction database shared by all nodes participating in a system based on the Bitcoin protocol.

Maintaining business continuity during storm season and beyond

June 8, 2015 No Comments

In today’s business technology-driven environment, it’s not a matter of “if,” but “when” business will encounter a breach or breakdown in the system. While this is especially true in areas like Tornado Alley, these concerns don’t just apply to tornado season. Natural disasters and extreme weather can unexpectedly hit throughout the year, so it is critical for organizations to approach business continuity and disaster recovery (BC/DR) as a proactive vs. reactive discipline.

Streamlining the Compliance Process with Automated Monitoring

June 5, 2015 No Comments

So far this year, three large health insurers have disclosed data breaches that affected millions of customers. Social Security numbers, addresses, birthdays, even information about medical conditions, have been stolen for sale to the highest black market bidder. And while the cyber criminals are making money hand over fist, breached companies are losing it.

Doing Versus Planning: The New Way to Build Enterprise Apps

June 4, 2015 No Comments

Aygun Suleymanova, Progress SoftwareWhether a developer is building mobile apps for a small- to medium-sized organization or a multinational enterprise, the apps themselves have to be enterprise-ready. Read More >>>

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

June 3, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>

KnowBe4 Alert: New Strain Of Sleeper Ransomware

May 27, 2015 No Comments

KnowBe4 CEO Stu Sjouwerman issued an alert to IT managers that there is a new strain of dangerous ransomware infecting employee’s workstations called Locker. The ransomware has infected workstations but sat there silently until midnight May 25, 2015 when it woke up. Locker then started to wreak havoc in a massive way. Since the strain reared its ugly head, Reddit has been swarmed with hundreds of 600 comments in the first 24 hours.

NIST Releases New Guidelines for Supply Chain Security

May 27, 2015 No Comments

The National Institute of Standards and Technology (NIST) released new guidelines for managing risk in the supply chain. Aside from the legal ramifications of using unauthorized or counterfeit software, the focus of the guidelines centers around the potential risk introduced via third-party software, which includes commercial off-the-shelf (COTS), Government off-the-shelf (GOTS) and open source software (OSS). From a security practitioner’s viewpoint, each of these third-party software “products” introduces unknown risk to internal applications.

IT Briefcase Exclusive Interview with HYPR Corp: Fighting Online Fraud

May 21, 2015 No Comments

with George Avetisov, HYPR Corp.Here’s the problem, according to HYPR Corp., provider of a device-to-cloud biometric security platform: cyber criminals are focusing on mobile payments too, and organizations are repeatedly failing to secure data as it transitions to the cloud. Read More >>>

How serious is Data Loss?

May 20, 2015 No Comments

Data loss is one of the most serious concerns for both individuals and businesses. People who create, modify or enter any type of data into computer systems are aware of the effects of data loss on their work. Depending on the type of data loss that occurred, data recovery may be possible using various types of applications. There are many causes of data loss.

Killing Misconception: Five Steps to BPM Success

May 15, 2015 No Comments

by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>

Consumers Need an Education in Online Shopping Security 101

April 30, 2015 No Comments

by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>

Eight Realities That Demand Multi-Factor Authentication

April 30, 2015 No Comments

by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>

5 iPhone Reading Apps You Won’t Want To Miss

April 22, 2015 No Comments

Are you just getting on the e-reading bandwagon after all this time? Perhaps you want to test it out instead of investing in an e-reader right away. Whether you have an iPad or Nook tablet there is something out there for everyone. Whatever the case may be, you can test how you like this new found hobby by using your iPhone on the go. And with the widely available reading apps for iOS, you just might fall in love with one of them.

7 Steps to Securely Deploy Cloud Apps

April 22, 2015 No Comments

by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech