The latest in Security

Federating Identities for a Successful Enterprise IdP Deployment

Featured Article by Lisa Grady, Senior Solution Architect, Radiant Logic Don’t stop at federating with SAML or OpenID Connect, that's only half the battle When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access...

Read More

BIOGEARS NEW OPEN SOURCE HUMAN PHYSIOLOGY ENGINE

SOURCE: Applied Research Associates, Inc. RALEIGH, Oct. 1  2014 – Applied Research Associates, Inc. (ARA) announced today that the open source BioGears® Physiology Engine Mini Build is now available for download. BioGears® is a $7M, multi-year program funded by the...

Read More

Internet Safety by Top IT Security Experts

Featured article by Kelly Yee, VP of Marketing and Sales for Penango The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received...

Read More

Why VMI is the future for our BYOD Generation

By Israel Lifshitz is chief executive officer of Nubo Software While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world. VMI (Virtual Mobile Infrastructure)...

Read More

Protecting Your Data at Each Step of the Networking Path

By Bill Manning, VP of Global Business Power Solutions for APC by Schneider Electric As a critical component to everyday functions, data is the lifeblood of every business no matter how big or small. As the amount of business critical data grows, the importance of...

Read More

FireLayers Enables Secure Cloud Application Usage

SOURCE: FireLayers REDWOOD CITY, Calif. and HERZLIYA, Israel, September 17, 2014 – The shift to the cloud has been tectonic; however, the IT infrastructures of the last 20 years have not kept pace to adequately protect enterprise networks, data and transactions....

Read More

The Four Phases of Cloud Optimization

By Joe Kinsella, CloudHealth Founder and CTO Several years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to...

Read More

How far is too far when it comes to outsourcing IT?

Featured Article By Mike Decker, Director of Managed Services at Annese & Associates, Inc. With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in...

Read More

You Can’t Win the Data Loss Blame Game – So End It

Featured article By Omer Eiferman, CEO of Cellrox The bring-your-own-device (BYOD) movement is tempting Murphy’s Law on an unprecedented scale and changing the nature of the IT ‘blame game’ on Wall Street. In a world of desktops, tracking data leaks was much easier....

Read More

Efficient Data Automation for Financial Firms

Featured article by Jim Manias, Advanced Systems Concepts, Inc. Benefits of the Architectural Approach for IT Development The power of data for creating investments and mitigating risk has a long history, with one of the most well-known examples occurring in 1815 when...

Read More

Media Sponsorships

Join Security Experts - Gartner Security & Risk Management Summit

Get a $425 discount by using the code: ITBRIEFCASE

Join the premier conference for CISOs and their teams to enhance organizational protection in a dynamic threat and operating landscape. Address priorities like AI, cyber-risk, resiliency, regulations, and more.