Inside the Briefcase


IT Briefcase Exclusive Interview: Keeping Mobile Devices Safe and Secure with Wayne P. DeCesaris, Tangoe

IT Briefcase Exclusive Interview: Keeping Mobile Devices Safe and Secure with Wayne P. DeCesaris, Tangoe

with Wayne P. DeCesaris, Tangoe Inc.
In this interview, Wayne DeCesaris from Tangoe outlines ways in which organizations can overcome the dangers that BYOD brings to the table, and offers expert advice as to how to keep your organization...





Briefcase Highlights


DATA SECURITY

Data Security White Paper Released by Sims Recycling Solutions

July 11, 2013 No Comments

Sims Recycling Solutions, the global leader in electronics reuse and recycling, has released a downloadable white paper providing tips to ensure the data security of retired IT assets. As technologies, such as cloud-based computing, file-sharing applications, and mobile devices, increase employee efficiency and customer convenience, they also make it easier to collect, store, access, and transfer vast amounts of information. From the time data is collected to the time it is destroyed, digital data security has never been more critical.

IT Briefcase Exclusive Interview: Protecting Our Businesses and Our Government from Online Security Threats with Adobe

July 9, 2013 No Comments

By John Landwehr, AdobeIn this interview, John Landwehr from Adobe outlines top national security threats to desktops, laptops, tablets, and smartphones, and ways in which Adobe working to help businesses fight this security battle. Read More >>>

Look Inside Your Company to Prevent Costly Data Breaches

July 1, 2013 No Comments

By Linda Park, Symantec Corp.Data breaches are serious problems, costing some businesses millions of dollars in damages each year. But knowing these threats exist is one thing; understanding them is another. Read More >>>

IT Briefcase Exclusive Interview: Online Security without Compromise, with Alex Balan at BullGuard

June 28, 2013 No Comments

By Alex Balan, BullguardIn this interview, Alex Balan from Bullguard outlines the primary security threats that both users and businesses are facing online today, and offers expert advice for avoiding the “dark corners” where hackers may be lurking.Read More >>>

KnowBe4 Polls IT Professionals on Recent Security Leak: Washington Post Polls Suspect – NSA Practice Violates Privacy

June 13, 2013 No Comments

IT pro and former National Security Administration (NSA) analyst, Edward Snowden, recently leaked word of the NSA’s blanket surveillance programs – the “whistleblower” reportedly detailed the NSA’s practice of secretly obtaining court orders to track telephone calls and emails. According to a new Washington Post survey, a majority of Americans agree with the NSA’s security procedures.

Beware Trading Privacy for Convenience

June 11, 2013 No Comments

Customers must take back control of their data.

Knowbe4 Warns Parents About Digital Crime: Cybercriminals Target Children; Identities at Risk

June 10, 2013 No Comments

Digital crime is on the rise—a type of crime in which your credit, financial security and good name are at risk. Identity theft is now considered to be one of the fastest-growing crimes in America, made worse by the fact that criminals do not discriminate—cybercriminals are now targeting children. As cybercriminals begin focusing their efforts on 6 to 16 year-olds, Internet security awareness training firm KnowBe4 (www.knowbe4.com) advises parents to take the threat seriously and to quickly enact safety measures to limit risk for their children.

Kroll Ontrack reveals five common IT administrator mistakes that lead to data loss

June 6, 2013 No Comments

Kroll Ontrack, the leading provider of data recovery, ediscovery and information management products and services, today announced five of the most common IT administrator mistakes that can lead to data loss. Given the complexity and capacity of advanced storage devices and the criticality of organizational data, documentation and best practice implementation are critical when it comes to protecting data.

Ponemon and Symantec Find Most Data Breaches Caused by Human and System Errors

June 6, 2013 No Comments

Symantec Corp. (Nasdaq: SYMC) and the Ponemon Institute today released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent higher than other industries.

McAfee Quarterly Threat Report Sees Social Media Worm Resurgence as Spam Rises Dramatically

June 3, 2013 No Comments

McAfee Labs today released the McAfee Threats Report: First Quarter 2013, which reported a significant spike in instances of the Koobface social networking worm and a dramatic increase in spam. McAfee Labs also saw continued increases in the number and complexity of targeted threats, including information-gathering Trojans and threats targeting systems’ master boot records (MBRs).

MCAFEE SIMPLIFIES MOBILE DEVICE MANAGEMENT AND DATA SECURITY

May 29, 2013 No Comments

McAfee today announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software) is now fully integrated with the McAfee® ePolicy Orchestrator® (McAfee ePO™) platform. With McAfee EMM software, comprehensive security, policy, and management capabilities are extended to mobile devices. McAfee ePO software enables enterprises to protect their data on company-issued and employee-owned devices (smartphones, tablets, laptops, and desktop computers) through a single, unified infrastructure and console.

SDN, BYOD, Cloud, IT Security and Compliance…Where’s an IT Pro to Begin?

May 29, 2013 No Comments

SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, today outlined the three main drivers of network complexity – changing New Technologies, IT Operations and Business Operations – that many IT professionals face as they get their jobs done and provided best practices to help manage the chaos today and tomorrow.

Merchants Beware: Chargebacks911 Discloses Top 5 Hidden Sources of Chargebacks

May 20, 2013 No Comments

The word “chargeback” is enough to have many online merchants cowering in fear. Chargebacks, which occur when consumers dispute purchases made with their credit cards, are now a detrimental aspect of e‑commerce and the cause of imbalance in the industry.

How to Secure Your WordPress Blog Site from Hackers

May 16, 2013 No Comments

By Blake Pappas , Experts reveal that over 64 million blogs incorporate Wordpress software. Therefore, when the announcement was made recently that Wordpress had been successfully hacked, the world paid attention. Read More >>>

What’s Your Company Doing to Keep Its Data Safe?

May 15, 2013 No Comments

Mobile file access ready to be SCARED secure!

U.S. Chief Intelligence Officer Declares Cybercrime Top Threat—KnowBe4 Says Small & Medium Enterprises are at Even Greater Risk

May 6, 2013 No Comments

According to National Security Advisor Tom Donilon, cybercrime has now overtaken terrorism as the number one threat to United States security. This assessment from America’s most senior intelligence leaders noted that the rapid pace of new technological developments makes it difficult for security experts to keep up with hackers and new forms of malware.

Six Real Security Threats IT Professionals May Face in 2013

May 1, 2013 No Comments

IT Security can overwhelm even the most seasoned security expert when headline-grabbing threats like Spamhaus DDoS are brought to the forefront by media. SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, today outlined six security threats that many IT professionals never think they’ll face (until they do) and provided best practices to help prevent and manage unwanted threats from becoming a reality.

Hitachi Data Systems Unveils New Approach for Unified Data Protection and Instance Management

April 18, 2013 No Comments

Hitachi Data Instance Manager Provides a Holistic View and Management of Data Copies, Lowers Costs and Enhances Effectiveness of Data Protection

Chargebacks911 Warns Internet Merchants of Growing Trend: “Friendly Fraud” Chargebacks

April 18, 2013 No Comments

One of the biggest challenges facing online merchants today is a rapidly growing trend in the realm of Internet sales fraud. Scammers have recently chosen a new route to fool businesses—“friendly fraud,” an illegitimate type of chargeback or card dispute. “Friendly fraud” consists of consumers making an online purchase and then contacting their bank, stating that the transaction was not their doing, resulting in a chargeback. Chargebacks911, a company established by a former online retailer that specializes in servicing merchants, consumers and the majority of banking institutions, handles “friendly fraud” and other chargeback issues to quickly resolve disputes between cardholders and merchants.

Bing Tops Google in Malware-Ridden Search Results

April 15, 2013 No Comments

Do hackers writing malware-stuffed links in search results find a way to avoid Google’s search bots? That may explain a new report from a German security firm evaluating the safety of results returned by some of the world’s top search engines, including Google, Bing, Baidu and Yandex. The news isn’t good for Bing, but the search engine says it’s working hard to find those poisoned links and sniff out hackers when they use SEO techniques.

Time to ReThink Network Security

April 9, 2013 No Comments

Daniel Joseph Barry, NapatechThree recent trends in the IT industry have improved the efficiency and effectiveness of digital services: cloud computing, big data analysis and mobility. Unfortunately, this also provides cybercriminals with fewer, and more valuable, targets. Read More >>>

Are the 2011 and 2013 South Korean Cyber Attacks Related?

April 1, 2013 No Comments

n the past four years there have been several major cyber attacks against South Korea. We have identified a particular back door (Backdoor.Prioxer) that surfaced during the 2011 attacks. A modified version of this back door was also discovered during the 2013 attacks. The back door is based on publicly available code, but there are some indications that the same individuals are responsible for the 2011 and 2013 versions, pointing towards a possible connection between the two attacks.

How IT Departments Can Master March Madness

March 29, 2013 No Comments

By Raj Sabhlok, ManageEngineWith March Madness underway, IT teams across the country are feeling the impact of the NCAA basketball tournament games streaming on their companies’ networks. Read More >>>

Flash is Ready for More Writes

March 21, 2013 No Comments

By and large, datacenters have aggressively jumped on the flash-storage bandwagon and have ditched archaic hard disk data storage devices. The problem is that many organizations focus on the significant read functions of these high-speed drives, and haven’t spent too much time considering the write limitations of SSDs. To be clear, these limitations are fairly miniscule in the grand scheme of things, as they can be worked around. But at the very least, especially if you’re new to the solid state storage game, you’ll need to understand these limitations. Read More >>>

SpiderOak: Why Privacy Matters

March 21, 2013 1 Comment

SpiderOak was built from the ground up with privacy as its core value. While much attention is paid to security breaches and the vulnerability of data, there is a clear differentiation between security and privacy. Data breaches and security failures are a part of online life. SpiderOak is a firm believer in encrypting data from end-to-end so that 3rd party services who store your data never have plaintext access. Privacy is the best form of security.

South Korean Banks and Broadcasting Organizations Suffer Major Damage from Cyber Attack

March 21, 2013 No Comments

It has been reported in the media that several South Korean banks and local broadcasting organizations have been impacted by a cyber attack. The attack included the defacement of a Korean ISP/telecoms provider and also the crippling of servers belonging to a number of organizations.

IT Briefcase Exclusive Interview: Keeping Mobile Devices Safe and Secure with Wayne P. DeCesaris, Tangoe

March 8, 2013 No Comments

with Wayne P. DeCesaris, Tangoe Inc.In this interview, Wayne DeCesaris from Tangoe outlines ways in which organizations can overcome the dangers that BYOD brings to the table, and offers expert advice as to how to keep your organization safe and secure. Read More >>>

IT Briefcase Exclusive Interview: The Future of Mobile Security with Toby Rush, CEO, EyeVerify

March 8, 2013 1 Comment

with Toby Rush, EyeVerifyIn this interview, Toby Rush from EyeVerify stresses the importance of mobile device security, and emphasizes the value of biometrics as a next-generation security solution that every organization should consider. Read More >>>

Symantec Corporation Named One of the World’s Most Ethical Companies for 2013

March 6, 2013 1 Comment

Symantec Corp. (Nasdaq: SYMC) has been named one of the World’s Most Ethical Companies by the Ethisphere Institute,

F5 Networks 2013 RSA Security Trends Survey

March 4, 2013 No Comments

On Tuesday, February 26, F5 Networks conducted a survey on the exhibit show floor during RSA 2013. Conference attendees were asked two initial qualifying questions about their role within their organization and how much their job involves the management and implementation of security to ensure the validity of the survey results. More than 150 qualified respondents were then asked a total of five questions surrounding security trends.

ADVERTISEMENT

DTX ExCeL London

WomeninTech