Inside the Briefcase


IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

with Jerry Melnick, SIOS Technology
In this interview, Jerry Melnick, COO, SIOS Technology discusses the difference between SAN-based and Cloud data storage clusters, and the benefits and drawbacks of each approach.
Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...





Briefcase Highlights


DATA SECURITY

IT Security Tips for Keeping Kids Safe Online in 2015

January 14, 2015 No Comments

with Rawdon Messenger, TeenSafeSocial media — and the way teens use it — is changing quickly. Parents can’t be expected to keep up, even as they’re expected to keep their kids safe online. From Yik Yak to Medium to Tumblr, social media and smartphone apps have evolved far beyond facebook. Read More >>>

Crisis Communication: an Important Part of Emergency Preparation

January 14, 2015 No Comments

Businesses today are smart. They consider all kinds of outcomes for every business decision and use complex sets of variables to predict the future. If challenging times are coming for the company, they can often see it in advance and make preparations to lessen the storm. But among all the maybes and possibilities is one situation that many businesses tend to overlook: emergencies within the office itself. It may be a natural disaster, fire or even threat of violence.

Are Your Company Emails Exposed?

January 13, 2015 No Comments

The Email Exposure Check (EEC) is a one-time free service. KnowBe4 customers with a Gold package get an EEC sent to them regularly so they can address the issues that are found. An example would be the email address and password of one of your users on a crime site. Fill out the form below, and we will email you back with a PDF containing the list of exposed addresses. The number is usually higher than you think. No need to talk to anyone. (We need a valid email address from the domain of your own organization, so Gmail, AOL, Yahoo or any other ISP are not accepted)

IT Briefcase Exclusive Interview with IBM: Managing Big Data through Storage

December 18, 2014 No Comments

with Bernie Spang, IBM’s Systems & Technology GroupIn this interview, Bernie Spang from IBM’s Systems & Technology Group speaks with IT Briefcase on how users are adopting a more agile software defined storage approach, and how this philosophy prepares them for 2015 and the future. Read More >>>

Protecting Card Data: Going the Extra Mile for Security

December 18, 2014 No Comments

IT professionals working for merchant organizations face specific security and compliance requirements beyond those of other industries. For instance, the Payment Card Industry Data Security Standard (PCI DSS) has established scores of requirements to ensure a consistent framework for payment card data security in a merchant’s environment. Though merchants are required to comply with these standards, compliance in itself does not make for a complete security strategy.

Data Management in the Cloud: Five Fundamentals of Cloud Services Design

December 9, 2014 No Comments

by Robert Kaloustian, CommVaultWith adoption rates soaring, it’s safe to say that the “cloud” is here to stay. While companies of all shapes and sizes rush to jump on the cloud bandwagon, data management miscues could make their journey a long and bumpy ride. Read More >>>

What’s in Store for 2015 – Technology Edition

December 4, 2014 No Comments

by Dan Pickett, nfrastructureWe predict that through next year, technology will only continue to become “consumerized” as devices become more connected, everything becomes software-defined and the Internet of Things becomes completely engrained in our everyday life. Read More >>>

IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

December 3, 2014 No Comments

with Jerry Melnick, SIOS TechnologyIn this interview, Jerry Melnick, COO, SIOS Technology discusses the difference between SAN-based and Cloud data storage clusters, and the benefits and drawbacks of each approach. Read More >>>

’Tis the Season for Online Safety

November 25, 2014 No Comments

The holidays are approaching as quickly as a sleigh pulled by magic reindeer, and every year it seems like the shopping season starts earlier and earlier. In many places, Christmas decorations are now put up before Halloween, ensuring a long and profitable season for merchants. And while most of us have had the experience of opening a disappointing gift on Christmas morning, one thing that can ruin your holiday faster than a homemade sweater is finding out that someone has obtained your credit card number, or compromised your account on your favorite shopping website.

Seven Security Tips to Safeguard Customers and Bottom Line This Holiday Season

November 24, 2014 No Comments

The security of personal information remains a top concern for consumers and retailers. There is good reason for that. The Target breach compromised approximately 70 million records. The Home Depot breach potentially impacted another 60 million consumers. The National Retail Federation reported in 2012 that service companies lost more than $11 billion due to credit card fraud. We can no longer deny that cybercrime is a real and growing threat to the retail sector. Consumers are becoming more sensitive to the security of their personal information, and they expect more from the business community in general and information technology professionals in particular.

Understanding Deep Packet Inspection Once and For All

November 21, 2014 No Comments

Today’s IT is one of convergence, applications and a demand for constant availability. And when it comes to downtime, all of these elements combined with the fact that many new applications are being provisioned with SaaS providers have created the perfect storm for IT pros tasked with getting to the root of problems and keeping business running. The question, “Is it the network or the app?” has never been more critical, nor more difficult to answer.

Cloud and Data Protection Trends 2015

November 17, 2014 No Comments

This webcast will take a high-level look at technology trends within several major Data Protection domains, such as data loss prevention, storage system recovery, and data security.

How Retailers Can Still Improve Security before Black Friday

November 17, 2014 No Comments

Each year, retailers hustle and strain to get their online and in-store merchandise ready to entice shoppers for the annual Black Friday rush. Their main concern, of course, is whether this season’s merchandise will prove popular. But what might get overlooked, is whether they’ve done enough to ward off the worst kind of shopper: the Cyber Hacker — who preys on stores at peak holiday season and can cause serious financial and reputational damage.

Security Best Practices for E-Signatures

November 17, 2014 No Comments

By Michael Laurie, Silanis TechnologyElectronic signatures are a critical technology for new business process improvements in industries such as banking, insurance, real estate and healthcare. With security understandably being a top concern for those looking to implement a cloud-based e-signature solution, it is not enough to simply look for one that is ESIGN compliant. Read More >>>

Why Shellshock is Absolutely Terrifying for BYOD Security

November 12, 2014 No Comments

By Israel Lifshitz, NuboLate last month, it was discovered that the security vulnerability Shellshock can be made wormable and grant hackers the ability to run arbitrary codes on Bash, the most widely-used command processor which serves as the default shell for Unix, Linux and Mac OS X. Read More >>>

KnowBe4 Says “PCI Guidance On Security Awareness Programs on the Mark”

November 6, 2014 No Comments

KnowBe4 announced its support of the Payment Card Industry Council’s efforts to implement its standards through Security Awareness Training. In fact, the PCI Council thinks Security Awareness Training is so important, they just published a 25-page guidance paper that fully explains the what, why and how of these programs, making it very clear that in order for an organization to comply with PCI DSS Requirement 12.6, a formal security awareness program must be in place.

TBR Announces New Enterprise Security Practice

November 6, 2014 No Comments

TBR is pleased to announce the addition of Enterprise Security practice to guide security vendors and managed security service providers (MSSPs) in executing successful business models as the IT security market shifts between prevention and protection solutions (detection and response) and customer-managed and Security as a Service (SECaaS) deployments.

BASHed and ShellShocked

October 31, 2014 No Comments

There’s trouble abroad in cybersecurity land. A longstanding bug in a major UNIX and Linux component – known technically as CVE-2014-6271 and colloquially as ShellShock – is exposing tens of thousands of servers around the world to hackers.

Must Read eBook: Cyberheist

October 31, 2014 No Comments

Learn how to not be the next victim! Cyberheist was written for the IT team and owners / management of Small and Medium Enterprise, which includes non-profits, local and state government, churches, and any other organization with more than a few thousand dollars in their operating account in the bank.

Smarter Data Protection for your Evolving Business

October 29, 2014 No Comments

If your business is like many organizations that need to deliver 100% data availability, manage rapid data growth; yet control costs, now is the time to discover how modernized data protection can help your organization deliver better outcomes.

Webcast: Getting from Reactive to Proactive Endpoint Security

October 23, 2014 No Comments

Webcast: The security of your data depends on IT Security’s ability to move from reactive to proactive defense that involve both intelligence and policy based protection.

Symantec Internet Security Threat Report 2014

October 23, 2014 No Comments

The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

SANS Report Breaches Happen: Be Prepared

October 23, 2014 No Comments

Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources.

Symantec Intelligence Report: September 2014

October 23, 2014 No Comments

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

BYOD: California Court Decides Who’s Wearing the Pants

October 22, 2014 No Comments

The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”

Your Money or Your Files! A Short History of Ransomware

October 20, 2014 No Comments

Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is considered a data breach. Multiple ransomware strains are now attacking your end-users. Since September 2013, CryptoLocker has become vicious, and the first strain of second-gen ransomware CryptoWall V2.0 has reared its ugly head. But how did it get this far?

KnowBe4 Issues Alert: CryptoWall 2.0 Ransomware Moves to TOR Network

October 15, 2014 No Comments

Tampa Bay, FL (October 15, 2014) KnowBe4 issued an alert to IT Managers that a new version of the world’s most widespread ransomware CryptoWall has migrated to the TOR network. It has been upgraded to version 2.0, and continues to encrypt files so that a ransom can be extracted if there are no backups or if the backup process fails, often a common occurrence.

The Internet of Things Won’t Take Off Until These 3 Things Happen

October 15, 2014 No Comments

by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Tales of the Unexpected: How Hackers Trick Web Sites into Sharing Your Data

October 9, 2014 No Comments

Recent months have seen a run of high-profile security breaches: social media sites losing phone numbers, retail stores skimming credit cards, healthcare organizations leaking patient records, and even celebrity voicemails and photo streams being hacked.

ADVERTISEMENT

DTX ExCeL London

WomeninTech