IT Briefcase featured whitepaper Amazon Redshift Spectrum is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision-making. This fully managed, petabyte-scale data warehouse service in the cloud allows organizations...
The latest in Security
Featured article by Helen Parker, Independent Technology Author CompTIA Security+ certification is the universally recognized cert which is valuable for IT admins to acquire fundamental IT security skills. This certification works favorably for the candidates to crack...
Featured article by Mindy Laughton, Independent Technology Author Over the years, companies that didn’t embrace new technologies have been finding it hard to keep afloat in the ever-changing world of technology. Accordingly, most businesses find it hard to get started...
Featured article by Lora Young, Independent Technology Author It took almost five years, but Apple has finally made some progress fighting iPhone repair fraud. Current estimates show that while fraudulent repairs in China have dropped from a peak of 60% to about 20%,...
Each year, the Software Security Research (SSR) team at Micro Focus releases a report on the current state of application security. A single weak point in a line of code can create an open door for attackers and possibly neutralize all other security measures. This...
Featured article by Ana Galich, Independent Technology Author Technology has vaulted businesses all over the world into cost-effective and expansive practices, the likes of which could have only been imagined before the inception and adoption of the internet. Now,...
Featured interview with Alan Lopez, senior director of product marketing at Flexera In this discussion with Alan Lopez, senior director of product marketing at Flexera, we learn how the recent supply chain hacks from China will impact the IT Asset Inventory industry...
Featured article by Susan Melony, Independent Technology Author Protecting yourself from hackers and identity theft is more important than ever before, but also more challenging than at any other point in time. While cloud-based technology and apps can make life...
Featured article by Zylo co-founder and VP of Engineering, Ben Pippenger A quick search for “security breach” won’t just deliver news about the biggest scandal from the past few years. Instead, you’ll likely find one from just yesterday or last week. Following the...
Featured article by Eric Campbell, Independent Technology Author At the mention of spyware, the first thing that comes to the minds of frequent PC users is a type of malware that steals your personal and influential data without your realization and consent. These...


