Inside the Briefcase


IT Briefcase Newsletter: IT Security

IT Briefcase Newsletter: IT Security

View August 2013 Newsletter on IT Security. This newsletter features enticing interviews and articles on Information Technology Security.





Briefcase Highlights


DATA SECURITY

IBM Protects Clients from Security Attacks with New Cloud Solution

October 22, 2013 No Comments

IBM (NYSE: IBM) today announced a new cloud solution that combines software analytics and cloud security services to fend off web-based Distributed Denial of Services (DDoS) attacks for organizations doing business on the web and in the cloud. The new software and services are based on a partnership with Akamai Technologies, Inc.

SecureTower 5.0: new approach to the corporate information security

October 16, 2013 No Comments

Falcongaze Company completed a new phase of data protection system SecureTower development. The innovations touched many product modules but the most significant changes relate to the introduction of the functional allowing not only to intercept and analyze traffic for compliance with established information security policies, but also block the confidential data transmission. In addition, the module whereby the system recognizes text information in images was integrated into SecureTower.

Mobile Device Management and Why Enterprises Should Care

October 9, 2013 No Comments

with Bill Ho, Biscom While access via laptops is common and many companies have established use policies for them, the mobile device space is much less mature. Concerns about lost devices, embedded encryption, containerization, secure communications, and even malware disguised as apps are growing. Read More >>>

Reducing Cloud Risk in an Increasingly Connected World

September 25, 2013 No Comments

By Patrick Burke, RackspaceThe world is a different place today than it was 5, 10, 15, and certainly 50 years ago. Forget about sending a letter through the mail; simply finding a stamp can prove to be a Herculean task. For those born after 1985, a stamp is a small piece of paper that is purchased and displayed on an item of mail as evidence of payment of postage.Read More >>>

Attackers Sharpen Skills, What That Really Means for CISOs

September 24, 2013 No Comments

Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISO’s) must increase their knowledge of the evolving vulnerability and attack landscape, such as mobile and social technologies, to more effectively combat emerging security threats.

Locking down your cloud, part 3: Taking compliance beyond the basics

September 23, 2013 No Comments

By Kurt Hagerman, FireHostWhen it comes to compliance, many businesses treat it as nothing more than a checkbox they need to complete. This can be especially true of healthcare, finance and ecommerce businesses; as long as they meet the minimum Payment Card Industry (PCI) or HIPAA standards, they reason they’re safe. Read More >>>

Bring Your Own Cloud (BYOC) Spurs IT to “Bring Your Own Solution”

September 18, 2013 No Comments

By Dan Tully, Conduit SystemsPersonal cloud services are convenient, inexpensive, and always available. They also have the potential to wreak havoc on the enterprise in ways we’ve never seen before. Simply stated? Houston, we have a problem. Read More >>>

Cloud Fueling Next Rise in IT Spending, Innovation

September 16, 2013 No Comments

By Patrick Burke, RackspaceThe cloud, according to recent research, has successfully moved from nascent concept to a full-on force that touches nearly all aspects of both business and consumer experiences. It’s behind your mobile apps and your email and your company’s disaster recovery plans. Read More >>>

ITBriefcase Exclusive Interview: Securing Cloud Based Contact Centers with Dennis Empey, Echopass Corporation

September 11, 2013 No Comments

by Dennis Empey, EchpopassIn the following interview, Dennis Empey, chief information security officer at Echopass Corporation, discusses the serious risks to cloud-based contact centers – and what you should be doing today to protect your customers. Read More >>>

What Small Businesses Need to Know about Cloud Computing

September 10, 2013 No Comments

by Rick DelGado, Independent AuthorCloud computing may sound like the next big technology fad that only large companies with an IT budget can afford to experiment with, but the truth is completely the opposite. In today’s fast-paced business world where software and technology are critical to everything from marketing and sales to daily tasks like word processing, an affordable computing option is exactly what small businesses need. Read More >>>

IT Briefcase Exclusive Interview: Maximizing Enterprise Workflow in a Mobile World with Tom Bakewell, Good Technology

September 9, 2013 No Comments

by Thomas Bakewell, Good TechnologyIn the interview below, Thomas Bakewell from Good Technology discusses Mobile IT in respect to the current Big Data revolution, and offers expert advice for organizations looking to create application workflows that are inherently secure. Read More >>>

5 Overlooked Factors that Could Affect Your IT Budget

August 29, 2013 No Comments

by Rick DelGado, Independent AuthorWith tight budgets, many companies are looking for ways to reduce costs and be as efficient as possible. Finding those extra areas to cut even more costs can be difficult, but there are 5 factors you may have overlooked that affecting your budget. Read More >>>

The New Battlefront of Mobile Malware

August 28, 2013 No Comments

By Patrick Burke, RackspaceMobile security vendors are innovating to address mobile threats in ways that are almost completely different from security software found on most desktops and laptop systems. Read More >>>

If You Knew You Were Going to Be Cyber Attacked, What Would You Do Differently?

August 27, 2013 No Comments

Recent reports have found that cyberattacks against U.S. corporations are on the rise, along with an increase in international threats, especially from China, and emerging threats to small businesses. Today, it’s not a matter of if an organization will be the victim of a cyberattack, but when.

IT Briefcase Newsletter: IT Security

August 26, 2013 No Comments

View August 2013 Newsletter on IT Security. This newsletter features enticing interviews and articles on Information Technology Security.

IT Briefcase Exclusive Interview with Rajesh Ganesan, ManageEngine

August 19, 2013 No Comments

By Rajesh Ganesan, ManageEngineRajesh Ganesan from ManageEngine talks about the rise in data center remote access and how it’s making IT professionals – and IT management vendors – rethink their approach to securely accessing remote resources. Read More >>>

Enabling Pain-Free SSL Certificate Management

August 16, 2013 No Comments

There are a lot of important details in life that we don’t give much thought to on a daily basis, until something goes wrong. When we pull a back muscle, for example, we realize that almost every movement we make is affected, and we can find ourselves in constant pain. Unfortunately, we’re frequently subjected to similar phenomena in business IT. With daily fires to put out, we see manifestations of this experience all the time. One such area of occurrence is in SSL certificate management.

IBM to Acquire Trusteer to Help Companies Combat Financial Fraud and Advanced Security Threats

August 15, 2013 No Comments

IBM today announced a definitive agreement to acquire Trusteer, a leading provider of software that helps protect organizations against financial fraud and advanced security threats. The acquisition of Trusteer advances the investment IBM is making in cloud-delivered software and services. Financial terms were not disclosed.

IBM SERVICES AND SOFTWARE SELECTED FOR DEPARTMENT OF HOMELAND SECURITY’S CYBERSECURITY INITIATIVE

August 14, 2013 No Comments

IBM today announced its industry leading security software and services offering will be part of the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program.

Webroot and gateprotect Partner to Deliver a Holistic Approach to Complete Security

August 13, 2013 No Comments

August 13, 2013 – Webroot, a leader in cloud-based security intelligence solutions, today announced a strategic partnership with gateprotect, the German network security specialist, to offer real-time endpoint protection with gateprotect’s Next Generation Firewall appliances. The combination of Webroot SecureAnywhere® Business – Endpoint Protection with gateprotect’s next generation network security strengthens protection from every endpoint to any network boundary while simplifying management.

Nine Myths and Facts About CAs and SSL Certificates

August 9, 2013 No Comments

Over the years a few misconceptions about CAs and the SSL infrastructure have arisen. Despite reports and scare tactics about the collapse of the SSL/CA model, the CA Security Council (CASC) is here to set the record straight and dispel the myths of the industry.

IT Briefcase Exclusive Interview: Securing a World of Information with Katherine Lam, HP ArcSight

July 30, 2013 No Comments

with Katherine Lam, HP ArcSightIn the below interview, Katherine Lam from HP outlines some of the most prominent security threats emerging in the IT space today, and offers expert advice for organizations looking to overcome the security challenges they face as enterprise data volumes continue to grow. Read More >>>

IBM Unveils New Software to Help Organizations Identify and Predict Security Risk

July 25, 2013 No Comments

IBM today announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time, while reducing total cost of security operations.

7 Things to Think About Before a Disaster Hits

July 20, 2013 No Comments

Hindsight is 20/20. It’s easy to see where the gaps in your disaster recovery plan are after you’ve recovered. But, hindsight could be too late to save crucial systems that are required for your business to operate at its highest level. So, what are the most important to consider before a disaster hits that will save your systems? Here are seven questions to ask yourself that could help you better protect your applications if disaster strikes tomorrow.

IT Briefcase Exclusive Interview: Staying Secure in the Cloud with Dr. Nataraj (Raj) Nagaratnam, IBM

July 19, 2013 No Comments

with Dr. Nataraj (Raj) Nagaratnam, IBM Security SystemsIn this interview, Dr. Nataraj (Raj) Nagaratnam from IBM Security Systems offers expert advice for organizations looking to securely manage a multitude of mobile devices in the cloud and on corporate networks. Read More >>>

Mobile Computing: Are BYOD Policies Even Worth It?

July 16, 2013 1 Comment

By Joe McKendrick, Author and Independent ResearcherIt’s no use even trying to control it. BYOD (Bring Your Own Device) is here to stay. Everyone is bringing in their own devices to help at work, and trying to fight this trend is like trying to stop the tides from coming in. Some organizations, it is reported, are even mandating that employees bring in their own smartphones for work. Read More >>>

Summer in the Server Room: Strengthen IT Security

July 16, 2013 No Comments

By Vinod Mohan, SolarWindsIt’s summertime—the season of fun in the sun and beach vacations. But as business slows down, what’s happening in the server room and network operations center? Unfortunately, security threats know no seasons, which means neither does IT. Read More >>>

Protect What You Can. Dam the Rest.

July 16, 2013 2 Comments

By Michael Susong, Litera Corp.We are more than a stereotype. We are everything that could happen. Concocted and linked together to prepare for the worst and hope for the best. We are the sum of our parts. We are Murphy’s Law…a hypercane. Read More >>>

Your Guide for Migrating from 1024-bit to stronger SSL certificate key lengths

July 12, 2013 No Comments

This guide aims to help educate and inform users of TLS/SSL certificates about the upcoming change in key lengths and tips on managing their transition to using stronger SSL certificates.

IT Briefcase Exclusive Interview: Securing the eDiscovery Frontier with Trevor Daughney, Symantec Enterprise Vault

July 11, 2013 No Comments

with Trevor Daughney, SymantecIn this interview, Trevor Daughney from the Information Intelligence Group at Symantec discusses ways in which organizations today can optimally manage their company information early in the eDiscovery process to save costs and increase ROI. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech