Inside the Briefcase


Presidential Order and Directive Set New Initiatives and Mandates for Securing Critical Infrastructure

Presidential Order and Directive Set New Initiatives and Mandates for Securing Critical Infrastructure

Tweet New Initiatives and Mandates for Critical Infrastructure Cybersecurity: An Analysis for Owners and Operators Due to these escalating attempts to disrupt or destroy infrastructure, President Barack Obama issued on February 12, 2013, an executive order (EO) and presidential...

IT Briefcase Exclusive Interview: Overcoming the Big Data Backup Challenge with Symantec NetBackup

IT Briefcase Exclusive Interview: Overcoming the Big Data Backup Challenge with Symantec NetBackup

By Simon Jelly, Symantec Information Management Group
In this interview, Simon Jelly from Symantec Information Management Group outlines the primary benefits of an integrated data protection platform, and offers pointers for businesses trying to juggle the increased speed,...

IT Briefcase Exclusive Interview: Secure Cloud Computing with Dave Elliott, Symantec

IT Briefcase Exclusive Interview: Secure Cloud Computing with Dave Elliott, Symantec

with Dave Elliott, Symantec
In this interview, Dave Elliott from Symantec offers expert advice for organizations interested in safely transitioning to the Cloud, and overcoming security challenges associated with BYOD. Read More >>>

IT Briefcase Exclusive Interview: IT Security – Prevention is Key with Dodi Glenn, GFI VIPRE Antivirus

IT Briefcase Exclusive Interview: IT Security – Prevention is Key with Dodi Glenn, GFI VIPRE Antivirus

with Dodi Glenn, GFI VIPRE Antivirus
In this interview, Dodi Glenn from GFI's VIPRE Antivirus outlines steps that organizations can take to prevent malware attacks, and emphasizes the importance of effective patch management in keeping valuable business information...





Briefcase Highlights


DATA SECURITY

Enterprise App Demands Grow and Shift to In-house: Effects on IT

March 1, 2013 No Comments

By Justin Strong, NovellIf an app can track my 26 mile run through a remote desert, then why can’t my company make an app to help me find client reports while away from my desk? So how is the enterprise responding? Read More >>>

Agile & Security: How to keep it safe when you’re moving fast

February 28, 2013 No Comments

By Cliff Schertz, Tiempo Development A key component of development, effective security practices that prevent compromised data, exploited vulnerabilities and other breaches are critical for creating a solid product that satisfies and protects customers at the same time. Read More >>>

IT Briefcase Exclusive Interview: Bracing for BYOD and Beyond with Ananth Vaidyanathan, ManageEngine, a division of Zoho Corp.

February 25, 2013 No Comments

with Ananth Vaidyanathan, ManageEngineIn this interview, Ananth Vaidyanathan from ManageEngine discusses the ever growing role that Mobile is playing within businesses today, and emphasizes the value of efficient and reliable desktop and mobile device management software. Read More >>>

SolarWinds Survey Finds Complex Security Tools are a Major Obstacle to Securing IT

February 13, 2013 No Comments

SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, today released the results of a survey on IT security and compliance that emphasize the growing need for powerful and easy-to-use security products focused on the key security concerns plaguing the majority of IT professionals.

DATA SECURITY, News

Presidential Order and Directive Set New Initiatives and Mandates for Securing Critical Infrastructure

February 12, 2013 No Comments

Tweet New Initiatives and Mandates for Critical Infrastructure Cybersecurity: An Analysis for Owners and Operators Due to these escalating attempts to disrupt or destroy infrastructure, President Barack Obama issued on February 12, 2013, an executive order (EO) and presidential policy directive (PPD) aimed to reduce the risk of cyber threats and attacks on the nation’s […]

Symantec and Microsoft take down Cybercrime network – Bamital botnet

February 8, 2013 No Comments

Symantec has been tracking this botnet since late 2009 and recently partnered with Microsoft to identify and shut down all known components vital to the botnet’s operation.

FireHost Releases FluidScale Rebootless Scaling Technology; Eliminates Downtime for Enterprise, Transactional, and SaaS Applications

February 6, 2013 No Comments

FireHost, the secure cloud hosting company, has transformed the cloud industry again, today introducing FluidScaleTM. This unique, enhanced scaling option knocks out the generally accepted notion that a reboot is required in order to add additional memory or processor resources to meet website and application scaling demands.

Oracle Buys Acme Packet

February 4, 2013 No Comments

Oracle today announced that it has entered into an agreement to acquire Acme Packet (NASDAQ: APKT), the leading global provider of session border control technology

Optimizing Health Data Security with Cloud and Virtualization

January 31, 2013 No Comments

New virtualization and cloud technologies are helping healthcare organizations shape their security, management, and data center environments. However, in creating a solid platform, administrators must look at the various virtualization technologies which can create and maintain efficiencies on multiple levels. Many times some of the best cloud and virtualization designs fail to take one very important aspect into consideration: the end-user.

Hacking: The New National Pastime?

January 31, 2013 No Comments

Less than a year ago, retailer Barnes & Noble yanked an issue of Linux Format magazine from its U.S. shelves because of a cover story on the topic of “hacking.”

IT Briefcase Exclusive Interview: Overcoming the Big Data Backup Challenge with Symantec NetBackup

January 30, 2013 No Comments

By Simon Jelly, Symantec Information Management GroupIn this interview, Simon Jelly from Symantec Information Management Group outlines the primary benefits of an integrated data protection platform, and offers pointers for businesses trying to juggle the increased speed, volume, and variety of data that Big Data brings to the table. Read More >>>

Facebook Graph Search: Welcome to the Phishing Pool

January 21, 2013 No Comments

Facebook’s privacy critics might have a point when it comes to the new Graph Search function, which security researchers warn could be used to amass information to be used in phishing campaigns. “It will simply help expedite and simplify creating a targeted social-engineering attack,” said Angel Grant, senior manager at RSA. “Think about how many of your Friends you really know.”

Benchmarking For a Better Cloud

January 21, 2013 No Comments

By Kurt Hagerman and Todd Gleason, FireHostIn the not-so-distant past, evaluating cloud infrastructure options was a simple task. There wasn’t a lot of variety in the cloud, so the choice came down to cloud vs. dedicated, and in pretty much every category but price, dedicated won. Read More >>>

U.S. government says Java still poses risk, even after security update

January 14, 2013 No Comments

The U.S. Department of Homeland Security reiterated advice for computer users to disable Oracle Corp’s widely used Java software for surfing the Web, saying it still poses risks to users after the company released an emergency update over the weekend.

Disaster Recovery and the SMB: Ensuring Continuity in 2013

January 9, 2013 No Comments

By Dan Tully, Conduit SystemsWhether natural or man-made, disaster can wreak havoc on your business at any time. The up-front and hidden costs of downtime can be devastating. So much so, that according to the National Archives and Record Administration, 98 percent of companies that lost data 10 days or more filed for bankruptcy within one year and 50 percent of those companies filed for bankruptcy immediately. Read More >>>

BullGuard Internet Security 2013 Makes it Easier to Ward Off Cyber Crime

January 4, 2013 No Comments

Award-winning internet and mobile security solutions provider BullGuard’s latest version of its internet security solution, Internet Security 2013, provides tougher resistance against online intruders, intercepting viruses based on how they behave on a computer, walling off cyber hackers and thieves, and warning users of websites harboring malicious code before they click. The software’s multiple layers of protection include parental controls and are accessible through an intuitive user interface, producing a powerful, easy-to-use online security tool that takes only minutes to install.

Some Hidden “Gotchas” of BI and Analytics

January 3, 2013 No Comments

Bernard Wehbe StatSlice SystemsBecause the purpose of a data warehouse that feeds your BI platform is reporting, analysis and data integration, security is usually NOT a focus when systems are designed. Data security gotchas are not always readily identifiable in an analytics project. Read More >>>

Top Online Security Threats of 2013 — and How You Can Protect Yourself

December 31, 2012 No Comments

Next year will be the year of the mobile security threat, according to Internet security software giant McAfee, based on the predictions report it released today of the leading security threats expected in 2013. With online technology rapidly moving from computers to the palms of our hands, cybercriminals and hackers are evolving their methods to fit the times. Whether it’s the new Windows 8 OS or the trendy HTML5 browser language, cybercriminals will be stepping up their game in 2013 to capitalize on the newest technology.

Staying Ahead of Cybermuggers

December 27, 2012 No Comments

Many people know it’s a bad idea to open attachments in email received from strangers, but relatively few know they need to take the same precautions when clicking links on social media sites and even VoIP (Voice Over IP) service Skype. In recent weeks, cybercriminals have been targeting individuals through Skype, and the criminals have been picking up their game and increasingly utilizing so-called ransomware or scareware.

IT Briefcase Exclusive Interview: Secure Cloud Computing with Dave Elliott, Symantec

December 19, 2012 No Comments

with Dave Elliott, SymantecIn this interview, Dave Elliott from Symantec offers expert advice for organizations interested in safely transitioning to the Cloud, and overcoming security challenges associated with BYOD. Read More >>>

It Takes Intelligence to Close the Identity and Access Management Gap

December 17, 2012 No Comments

The challenge for banks has always been ensuring the right people have the right access to the right resources and do the right things with them — this is identity and access management (IAM).

BeyondTrust Acquires Blackbird Group to Help Organizations Better Protect Identity Investments

December 17, 2012 No Comments

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the acquisition of Blackbird Group, a leader in Windows system management.

Analyzing Project Blitzkrieg, a Credible Threat

December 17, 2012 No Comments

Project Blitzkrieg, a current attack on US financial institutions, got a lot of media attention following a blog posting by RSA researchers who wrote they had discovered an operation run by an individual known as vorVzakone. RSA identified the malware as belonging to the Gozi family and labeled it Prinimalka.This paper provides an insight into the creditability of this threat to the financial industry and analyzes the claims made by vorVzakone in his forum posting.

AlertEnterprise Presents at Gartner Identity and Access Management Summit

December 17, 2012 No Comments

The session was titled “Secrets to Extending Identity and Access Management Across the Enterprise with IT-OT-Physical Security Convergence”, reflecting a growing need for IT-OT Convergence Solutions.

IT Briefcase Exclusive Interview: IT Security – Prevention is Key with Dodi Glenn, GFI VIPRE Antivirus

December 6, 2012 No Comments

with Dodi Glenn, GFI VIPRE AntivirusIn this interview, Dodi Glenn from GFI’s VIPRE Antivirus outlines steps that organizations can take to prevent malware attacks, and emphasizes the importance of effective patch management in keeping valuable business information safe. Read More >>>

ITBriefcase.net Newsletter: Security

December 3, 2012 No Comments

IT Briefcase Security Newsletter.

Diversinet Introduces mobiHealth Wallet with New Patient-Centered Health Information

December 3, 2012 No Comments

Diversinet Corp. (TSX Venture: DIV, OTCQB: DVNTF), a leader in secure mobile health that “Powers Care Coordination through Mobility,” today announced mobiHealth Wallet™, a secure, personalized virtual container for downloading, entering, managing and sharing personal health information.

IT Briefcase Exclusive Interview: Security Patch Management with Lawrence Garvin, SolarWinds

November 29, 2012 No Comments

with Lawrence Garvin, SolarWindsIn this interview, Lawrence Garvin from SolarWinds explains how security patch management can operate as one of the best lines of defense for protecting a corporate computing infrastructure. Read More >>>

Disaster Recovery Planning for Smaller Organizations

November 28, 2012 No Comments

By Glen Gray, SolarWindsThe first step in creating a disaster recovery plan should be a thorough analysis to determine just how long your organization can survive without the bulk of its IT infrastructure. Read More >>>

Mobility Strategy that Works

November 28, 2012 No Comments

By Troy Fulton, Tangoe Inc.Many companies lack an enterprise-wide mobile strategy, an oversight that can expose the company to security threats including those from well intentioned employees trying to get their work done. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech