Inside the Briefcase


IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

with Chris McNabb, DELL Boomi
In this interview, Chris McNabb from Dell Boomi offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile applications. Read More >>>





Briefcase Highlights


DATA SECURITY

ITBriefcase Exclusive Interview with R. Paul Singh, Espresso Logic

April 29, 2014 No Comments

with R. Paul Singh, Espresso Logic, Inc.In the following interview, R. Paul Singh, CEO of Espresso Logic, discusses the challenges IT teams face today in producing the increasingly high volume of internal and external applications for their companies – and highlights how its newly released Live Browser product can help. Read More >>>

KnowBe4 Issues CryptoDefense Warning – Ransomware is Worse than CryptoLocker

April 3, 2014 No Comments

April 3, 2014 KnowBe4 CEO Stu Sjouwerman issued an alert today warning computer users of a new but very nasty ransomware named CryptoDefense. A copycat competitor to CryptoLocker, CryptoDefense was released in late February, 2014 and is much worse than the original.

DriveSavers – Warm Weather Protection Tips

April 1, 2014 No Comments

As you plan and prepare for your family vacations and favorite getaways this spring, it’s likely you’ll have some kind of mobile device on your travel checklist. Gadgets like iPads add cool convenience to our lives, but do you know how to guard your mobile devices from being damaged? DriveSavers Data Recovery, the worldwide leader in data recovery services, has put together a list of tips to protect your devices and the precious data they hold.

CONTROVERSY SURROUNDING ADVANCED EVASION TECHNIQUES LEADS TO HIGH PRICE TAG FOR BUSINESSES

March 31, 2014 No Comments

A new report by McAfee, a division of Intel Security, examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs), and the role that they play in Advanced Persistent Threats (APTs).

KnowBe4 Study Shows Maintaining Security Getting Much Harder for IT

March 28, 2014 No Comments

Security is harder to maintain than it was a year ago according to a study done by KnowBe4, a US based security awareness company. Ransomware (CryptoLocker or CryptoDefense), rapid technology advances and adoption of BYOD create a greater challenge for businesses to stay abreast of the numerous internal and external threats that safeguard their systems and networks. According to a March 2014 study by KnowBe4 of IT Managers, fifty one percent of respondents find security harder to maintain now than a year ago while forty percent find it is about the same. Less than ten percent are finding it easier.

Trend Micro Extends Cloud Security Solutions on AWS with New Initiatives for Customers

March 27, 2014 No Comments

Reinforcing ongoing support of the AWS shared security model, Trend Micro Incorporated (TYO: 4704; TSE: 4704), an AWS Advanced Technology Partner and global leader[1] in cloud security, today announced at the AWS Summit 2014 new initiatives that will help organizations fulfill their shared security responsibilities for protecting data and applications within their deployments on AWS.

5 Factors to Consider Before Implementing Virtualization

March 25, 2014 No Comments

by Rick DelGado, Independent AuthorOne solution that has been rapidly expanding is virtualization, where a virtual version is created in place of something, whether that be a desktop, operating system, server, or storage device. Read More >>>

Unintended Consequences of Compliance Seen as a Stumbling Block to Security

March 13, 2014 No Comments

KnowBe4 announced a new release of their Compliance Manager, its latest cloud-based offering for IT managers who are challenged by the increasing complexity of managing compliance requirements, adding self-assessment capabilities.

Changing the Game with Big Data

March 11, 2014 No Comments

by Gil Allouche, QuobleWhile the courtship between sports and data analysis has been going on for decades, only recently has it really taken off….think Moneyball. Read More >>>

Preventing Unauthorized Access to Mobile Computers and Reducing the Risk of Data Loss

March 11, 2014 No Comments

The mobile computing market shows no signs of slowing down, which means more laptops and tablets are brought along on business trips, to sales meetings and on vacations than ever before. This leaves a lot of devices and the data they contain at risk of theft or of simply being lost. You can use a few simple tools and techniques, such as Windows BitLocker and a good backup solution, to help guard against unauthorized access and to minimize the risk of data loss should the device fall into the wrong hands.

Who Pays for BYOD?

March 3, 2014 No Comments

by Rick DelGado, Independent AuthorThere are many factors businesses must consider when creating a BYOD policy. Most businesses tend to focus on security and for good reason, but it’s important to not overlook the cost factor for BYOD, in particular the cost sharing between the employee and the company. Read More >>>

IT Disaster Recovery Plans: What Will Happen with Your Data in the Zombie Apocalypse?

February 27, 2014 No Comments

by Andre Smith, Internet, Marketing and E-Commerce specialistData is valuable. Without the means to restore or the appropriately trained staff to deploy, the data is rendered useless. Go beyond a basic data recovery plan. Don’t delay in developing your business’s IT data recovery plan, or scheduling a test of your existing plan today. Read More >>>

The Business Case for On-premise AND Cloud Storage Solutions

February 24, 2014 No Comments

by Rick DelGado, Independent AuthorThe debate over cloud storage vs. on-premise storage has created some pretty strong opinions on both sides of the issue, but taking the all-or-nothing approach ignores a viable option that allows companies to create a tailored storage solution for their needs: a hybrid solution. Read More >>>

Infographic: Five Most Catastrophic Viruses of All Time

February 20, 2014 No Comments

In the past, viruses and other kinds of malware would spread via spam email, booby-trapped websites which had been infected or malicious pop-up adverts. While all these are still common today, modern examples of malware causing damage have become more sophisticated, involving things like turning millions of PCs into miners for Bitcoins.

The Growing Paranoia: Data Breaches and How To Protect Yourself

February 14, 2014 No Comments

by Eric Knight, Dirtsearch.orgYou just paid your rent online. The site seems safe and you don’t think twice about a data breach, but is it? As cases of online identity fraud grow, one can never be too careful about freely giving away personal information. Read More >>>

Your Productivity Lifeline — a More Reliable VPN Connection

February 12, 2014 No Comments

with Mike Brown, BlackberryAnyone who has ever worked from home while waiting for the elusive cable guy, experienced airport weather delays, or been stationed off site at an event knows all too well that a reliable VPN connection is their lifeline for getting work done. Read More >>>

IT Briefcase Interview Highlighting Free Cloud Service to Monitor Your On-Premise Monitoring Products

February 7, 2014 No Comments

with Gibu Mathew, ManageEngineIn this interview, Gibu Mathew from ManageEngine outlines the benefits of a cloud-based service that monitors traditional on-premise network, system and application monitoring products. Read More >>>

Prolexic Warns of Cyber Attackers Using DDoS Attacks to Influence Stock Prices and Limit Trading

February 4, 2014 No Comments

Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today shared an analysis of nearly a dozen global DDoS attacks that indicates cyber attackers are using DDoS attacks in an attempt to influence market values and interfere with exchange platforms. The Prolexic Security and Engineering Team (PLXsert) details the findings in a white paper, DDoS Attacks Against Global Markets, which was published today and can be downloaded at www.prolexic.com/ddos-markets.

Overview of Enterprise Storage Markets

January 27, 2014 No Comments

by Rick DelGado, Independent AuthorData storage may not sound like a critical component of running a business, but it is actually a major component of the IT infrastructure and can have severe detrimental effects on a company if it is set up poorly. Read More >>>

7 Ideas to Improve Network Security In Healthcare

January 24, 2014 No Comments

Watch this webinar to learn best practices from healthcare customers and seven ideas that will help improve your network security investments.

Prolexic Publishes Top 10 DDoS Attack Trends for 2013

January 22, 2014 No Comments

Throughout the year, metrics were collected from all DDoS attacks launched against the company’s global client base by the Prolexic Security Engineering & Response Team (PLXsert) using proprietary techniques and equipment. Through digital forensics and post-attack analysis, PLXsert is able to build a global view of the evolving DDoS threat.

Four barriers to virtualization adoption among small businesses

January 22, 2014 No Comments

By Mark Oliver, Group Oliver Today, computers are so prolific that their use is almost ubiquitous to the average user. The increase functions computers are able to perform for both individuals and businesses continues to grow. Read More >>>

2014 Predictions for Cloud and Application Development

January 15, 2014 No Comments

By Johan Den Haan, Mendix Forward-thinking CIOs and IT leaders are embracing app-fueled innovation as a driver of business growth and differentiation. What they’re realizing, though, is that not all apps are created equal. Read More >>>

Mobile Applications Being Used for DDoS Attacks

January 15, 2014 No Comments

Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today reported that mobile applications are being used in DDoS attacks against enterprise customers. This is one of many key findings found in the company’s Q4 2013 Global DDoS Attack Report, which was published today and can be downloaded from www.prolexic.com/attackreports.

New Year’s Resolutions to Boost IT Help Desk Effectiveness

January 13, 2014 No Comments

It is that time of the year again when you sit down, take stock of your IT help desk’s performance these past 12 months and chart a course for success in the new year. Call them New Year’s resolutions, departmental priorities or simply a plan of action; whatever the name, here’s a list of the top five things you could focus on in 2014.

IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

January 13, 2014 No Comments

with Chris McNabb, DELL BoomiIn this interview, Chris McNabb from Dell Boomi offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile applications. Read More >>>

The Massively Distributed Cloud Requires Massively Distributed Solutions

January 9, 2014 No Comments

By Carson Sweet, CloudPassageDespite rapid adoption, security remains a top obstacle to successful adoption. Enterprises are sinking a lot of money into addressing these problems – Gartner estimates that cloud security spending will nearly double between 2013 and 2017 with a 28% annual growth rate. Read More >>>

BYOD Strategies: Which One Is Right For Your Company?

January 8, 2014 No Comments

by Rick DelGado, Independent AuthorThere are measures that can be taken to help protect company data in a BYOD atmosphere. This article outlines three strategies that can help. Read More >>>

SQL Integrity Check

January 7, 2014 No Comments

With SQL Integrity Check, quickly reveal problem spots on SQL Servers before you back it up – no need to write and maintain scripts.

The Perfect Data Storm, Fueled by Big Data & Hybrid Cloud, Looms for 2014

December 30, 2013 No Comments

By Yves de Montcheuil, TalendWith regards to cloud computing, we are now way past the initial hype and entering a new era of hybrid deployments, where the cloud transparently extends the data center. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech