July 29, 2015
With the release of Windows 10 comes another opportunity for Microsoft to align its direction for mobile to better serve developers and IT departments. Together with a subtle name change to Windows 10 Mobile, Microsoft is looking to draw a line in the sand on its failed attempt to chase Apple in the consumer market with Windows Phone.
July 23, 2015
This white paper reviews the risks facing organizations running end-of-life (EOL) platforms like Windows Server 2003 and the options available to address those risks.
July 23, 2015
In June 2014, Forrester Consulting was commissioned to evaluate a shift in roles and priorities in IT security budgeting and decision-making in the wake of increased prevalence of and attention to targeted attacks and advanced threats.
July 23, 2015
This paper follows “The Cloud Manager’s Balancing Act,” which describes the need for cloud managers to balance developer time-to-value with security risk and costs.
July 23, 2015
In recent years there has been an increase in the number of companies allowing employees to use their own devices at work including mobiles, tablets and laptops. In fact more than just allowing it, some businesses actually encourage ‘bring your own device’ in their quest to reduce their IT overheads.
July 23, 2015
This paper defines what server security is, examines how and why the server security market is growing.
July 22, 2015
by Kristen Gramigna, BluePayMobile payments can equip small businesses to accept payment by credit or debit card, using the mobile device that small-business owners likely have within reach most of the time. While mobile payment technology can benefit both customer and business owner, some customers remain hesitant about them. Read More >>>
July 21, 2015
Enterprise resource planning (ERP) programs are much more than the software brand that runs them — they can serve as the foundation for business success. However, the majority of companies that operate ERP systems today (no matter the platform) struggle to get the most out of their ERP investment, primarily due to issues with governance.
July 21, 2015
There are so many options available for both on-site backup and cloud-based backup, there is no excuse for not executing very regular backup. To help prevent your backups being compromised, you should always have an off-site or redundant backup in place. Do not overlook the fact you should be testing that your restoration of files actually works! Always ensure you have adequate access to your backup sources and a function restoration method in place (DropBox, Google Drive and OneDrive are not set up or designed to be a backup service).
July 16, 2015
MSPs have to delicately dance between two key priorities: constantly scanning for the latest technologies to meet their customers’ changing needs and running the numbers to see if they can afford to provide those new technologies to their customers and do it in a reliable manner. One technology service that MSPs are struggling to figure out is how to add security and systems monitoring to their business portfolios, which is in great demand.
July 9, 2015
In many respects, Cloud Access Security Brokers are the future of what we currently know as the data center firewall. How so? A data center firewall sits in front of enterprise applications/databases (systems of record) in the data center, providing control and visibility. Increasingly, those applications and databases are moving from the corporate data center to the public cloud – with apps like Office 365, Box, and Salesforce, quickly becoming the norm in the enterprise. In this context, cloud apps become the new system of record. Since the traditional data center firewall can’t see cloud traffic, it can no longer provide the protection that we need.
July 8, 2015
This infographic portrays a new paradigm shift in how enterprises must protect their corporate assets and customer information.
June 29, 2015
with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>
June 25, 2015
with Ryan Wilk, NuData SecurityIn this interview, Ryan Wilk, director of Customer Success for NuData Security, talks speaks with IT Briefcase about just how serious data breaches can be to both the consumer and the organization, the latest trend in fraud and the best way to stop fraud before it starts. Read More >>>
June 25, 2015
June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data including accounting paperwork, employee documents and sensitive customer information, should be a priority.
June 23, 2015
Just a handful of years after the Internet became available to the public, the need for encryption became apparent. Without a way to encrypt user information and websites, private data could be stolen by hackers. That would make online interactions unsafe, which would render online shopping and important Web-based communications (with government agencies, for instance) impossible.
June 8, 2015
Even if you can’t quite explain what Bitcoin is or how it operates, chances are that you have at least heard of it. This leading-edge cryptocurrency has been shaking up notions of what currency is and how value is transmitted since its founding in 2008. Bitcoin is intriguing to investors, technology watchers and even a few bankers due it is blockchain technology, a transaction database shared by all nodes participating in a system based on the Bitcoin protocol.
June 8, 2015
In today’s business technology-driven environment, it’s not a matter of “if,” but “when” business will encounter a breach or breakdown in the system. While this is especially true in areas like Tornado Alley, these concerns don’t just apply to tornado season. Natural disasters and extreme weather can unexpectedly hit throughout the year, so it is critical for organizations to approach business continuity and disaster recovery (BC/DR) as a proactive vs. reactive discipline.
June 5, 2015
So far this year, three large health insurers have disclosed data breaches that affected millions of customers. Social Security numbers, addresses, birthdays, even information about medical conditions, have been stolen for sale to the highest black market bidder. And while the cyber criminals are making money hand over fist, breached companies are losing it.
June 4, 2015
Aygun Suleymanova, Progress SoftwareWhether a developer is building mobile apps for a small- to medium-sized organization or a multinational enterprise, the apps themselves have to be enterprise-ready. Read More >>>
June 3, 2015
Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>
May 27, 2015
KnowBe4 CEO Stu Sjouwerman issued an alert to IT managers that there is a new strain of dangerous ransomware infecting employee’s workstations called Locker. The ransomware has infected workstations but sat there silently until midnight May 25, 2015 when it woke up. Locker then started to wreak havoc in a massive way. Since the strain reared its ugly head, Reddit has been swarmed with hundreds of 600 comments in the first 24 hours.
May 27, 2015
The National Institute of Standards and Technology (NIST) released new guidelines for managing risk in the supply chain. Aside from the legal ramifications of using unauthorized or counterfeit software, the focus of the guidelines centers around the potential risk introduced via third-party software, which includes commercial off-the-shelf (COTS), Government off-the-shelf (GOTS) and open source software (OSS). From a security practitioner’s viewpoint, each of these third-party software “products” introduces unknown risk to internal applications.
May 21, 2015
with George Avetisov, HYPR Corp.Here’s the problem, according to HYPR Corp., provider of a device-to-cloud biometric security platform: cyber criminals are focusing on mobile payments too, and organizations are repeatedly failing to secure data as it transitions to the cloud. Read More >>>
May 20, 2015
Data loss is one of the most serious concerns for both individuals and businesses. People who create, modify or enter any type of data into computer systems are aware of the effects of data loss on their work. Depending on the type of data loss that occurred, data recovery may be possible using various types of applications. There are many causes of data loss.
May 15, 2015
by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>
April 30, 2015
by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>
April 30, 2015
by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>
April 22, 2015
Are you just getting on the e-reading bandwagon after all this time? Perhaps you want to test it out instead of investing in an e-reader right away. Whether you have an iPad or Nook tablet there is something out there for everyone. Whatever the case may be, you can test how you like this new found hobby by using your iPhone on the go. And with the widely available reading apps for iOS, you just might fall in love with one of them.
April 22, 2015
by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>