IT Briefcase

IT Briefcase Analyst Blog

Forrester’s 2018 Predictions: A Year of Reckoning

Desktop_SreenshotFORR
Forrester’s 2018 predictions describe the market dynamics that favor those taking aggressive action and create existential risk for those still holding on to what has worked before.

The Path to 2020: Marketers Seize the Customer Experience

Market
Analyst Report
Download this report to learn about this transformation and hear perspectives from CMOs at Georgetown University , JPMorgan Chase, Philips, Pure Storage and Unilever. Read More >>>

VIEW ALL IT Briefcase Analyst Blog Articles

FRESH INK

IT Briefcase Exclusive Interview: Only One-Quarter Who Pay Ransomware Fees Get Their Data Back

26884181 - ransomware
with Linus Chang, BackupAssist
In this discussion with Linus Chang, Co-Founder and CEO of BackupAssist, we learn why the strategy of planning to pay the ransom in the wake of a ransomware attack is misguided.
Read More >>>

IT Briefcase Exclusive Interview: Why Protecting Net Neutrality Means Protecting Innovation and Choice

Security breach
with Russell P. Reeder, OVH US
In this informative interview, Russell P. Reeder, CEO and president of OVH US, shares his thoughts on net neutrality and what the recent legislation changes mean for consumers and businesses.
Read More >>>


VIEW ALL FRESH INK

Featured Video

What is the Dark Web?

There are many layers of the internet that cannot be found using a search engine. CNBC's Tom Chitty explains the dark web and its many uses.

VIEW ALL Videos

Featured Webinars & Videos

Addressing GDPR Compliance: Implementing a Security Framework

This webcast summarizes several key requirements of the GDPR and maps them to Oracle Data Security features.

Webcast: Hybrid Networks, Securing Digital Transformation, by Computing

This webinar examines hybrid networks and investigates the best way to balance performance and security to create a viable path to digital transformation.

Finding your way in today’s rapidly changing tech environment

The cloud, big data, open source and machine learning have all been around for years, but are only now reaching the mass adoption at the enterprise level that is changing how software is created and IT is managed.

RANSOMWARE: Industrial Control Systems

70% of surveyed organizations surveyed an OT security compromise over the past 12 months resulting in operational disruption or loss of confidential information in their industrial networks.

Infographic: Oracle Databased Exadata Cloud Machine

Exadata Your Way, in the cloud, on premises, or both. Be introduced to Oracle Database Exadata Cloud Machine in this infographic.

VIEW ALL WEBINARS & VIDEOS

Featured White Papers

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender...

Cybersecurity Insiders 2018 Application Security Report

What happens when you mix swelling application portfolios and eager attackers? According the 2018 Application Security Report from Cybersecurity Insiders, you find 62% of organizations less than fully confident in their application security posture. With over 20 charts and graphs, the 2018 Application Security Report gives you insight into...

IDC ANALYST CONNECTION: The Digital Transformation Imperative for Retail

The following questions were posed by CenturyLink to Robert Eastman, research manager of IDC Retail Insights, on behalf of CenturyLink's customers.

Are you a target? Cyberthreats Infographic

No business is safe from cyberthreats. What’s the best defense? Arm your enterprise with consistent, reliable threat intelligence.

Unified Communications & Collaboration: Navigating The “All-Or-Nothing” Misconception

UC&C is a common platform for communications, both internally and externally, within an enterprise organisation. The components included in any UC&C solution — voice, IM, video, etc. —will vary from organisation to organisation. At any rate, UC&C brings all those communication lines together into a seamless integration for...

VIEW ALL WHITE PAPERS
ADVERTISEMENT

Gartner IT Sourcing

IBC 2018

ITBriefcase Comparison Report





We have updated our Privacy Policy. Click here to preview.

l>