Inside the Briefcase






Briefcase Highlights


Author Archive

Thwart money laundering and demonstrate compliance by improving your suspicious activity reports

November 21, 2017 No Comments

Due to increasingly stringent regulations both in the US and abroad, costly fines for noncompliance, stinging reputation damage, and the possibility of inadvertently assisting terrorists and criminals – instead of your intended customers – anti-money laundering (AML) is becoming increasingly critical for all financial organizations.

Cloud Security Alliance Releases New Cloud Security for Startups Report

November 21, 2017 No Comments

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released a new report titled Cloud Security for Startups. The new white paper, developed by the CSA’s Israel chapter, aims to help Software-as-a-Service Startups (SaaS-SUs) gain and maintain customer trust by building solid security foundations at an early stage of the product development process. In establishing security controls to match risks at any point in time, SaaS-SUs can successfully align those controls with product development and investment rounds.

News

Top 5 Technology Advancements with the Biggest Impact on Businesses

November 21, 2017 No Comments

Technology has transformed the way in which businesses operate, and this article considers the Top Five Technology Advancements that had the biggest impact on businesses. Each of these advancements can be thought of as waves of transformation that revolutionized in paradigm shifts that are described below.

Cyber Security – 4 Things to Do to Improve Computer Cyber Security and Prevent Cyber Crime Attacks

November 20, 2017 No Comments

In this article, you will learn to avoid all the silly mistakes most computer owners make and expose their computers and personal information open to cyber attacks. You’ll also discover why it is essential to change your passwords frequently and have up-to-date firewall and antivirus program.

Five Ways Using the Cloud Can Save You Time and Money

November 20, 2017 No Comments

For the last few years, cloud computing has become a lot more popular for businesses around the world. Here we’ll provide you with three reasons how using the cloud can improve your business.

7 New Tech Devices Of 2017 Worth Mentioning

November 17, 2017 No Comments

The Consumer Electronics Show in Las Vegas has finally come to a close and we have rounded up some of the best devices, which were on display. Consumers would definitely have been amazed by a large number of electronics, which had been displayed. We have selected for you 7 of the devices which we feel are worth mentioning.

ScaleArc Improves Uptime and Performance for Telmate Video and Audio Communications

November 15, 2017 No Comments

ScaleArc, a leader in database uptime, announced today that Telmate has built ScaleArc software into its telecom environment to improve availability and performance of its communications services. Telmate provides video and audio communications to inmates in correctional facilities, enabling connectivity with loved ones and improved mental health. The technology provider also delivers verification and investigative tools and services that increase physical safety and effectiveness of correctional facilities.

News

7 Tips to Boost a Slow Computer

November 15, 2017 No Comments

Is your computer slower than a sloth? Do you spend more time staring at the ceiling than your monitor? When you first bought your computer, it probably ran like a dream. But over time, as you fill it with games, apps, and photos, these files take up space on your hard drive. The result? Your computer runs slower — and you get more frustrated. Before you give up and toss it out the window, try these seven easy tips for speeding up your slow computer.

Three Key Areas of Your Business That Need Proper Knowledge Management

November 15, 2017 No Comments

A business is only as strong as the workforce it employs. Whether that workforce consists of one or one thousand, the employees are in charge of executing the vision set out by the company’s leadership. Ideally, the most crucial pieces of information that are possessed by one member of the company should be possessed by all, once management makes the decision that the information is useful enough to be made widely known without doing some sort of collateral damage.

How Big Data Will Impact Biomedical Research

November 15, 2017 No Comments

Big data has made an incredible advancement in technology over the past couple of years. It has been proven to be effective with it’s ability to find and collect different types of data. Big data has not only helped to pilot the technology behind artificial traffic lights but has specifically shown an improvement in the medical world. Big data has been able to equip doctors with enough data about their patient’s medical history to provide improved beneficial care.

Featured Articles

IT Briefcase Exclusive Interview: Is the IoT Infiltrating the Healthcare Industry?

November 14, 2017 No Comments

with Mohamed Shishani, Schneider ElectricIn this interview, Mohamed Shishani discusses how healthcare organizations are implementing new technologies to improve power management capabilities in their facilities, and the impact this has on patient care. Read More >>>

Forcepoint Enhances Human Point System with Increased Visibility and Enforcement to Protect Critical Data and IP

November 14, 2017 No Comments

Forcepoint is releasing more than 40 new software and hardware features across its Forcepoint Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Next-Generation Firewall (NGFW) and User and Entity Behavior Analytics (UEBA) products that enhance the understanding of user behavior and data flow throughout an enterprise or government organization to rapidly identify and eliminate risk. These capabilities work together as an intelligent ‘Human Point System’ to protect the human point as people interact with data across disparate networks.

News

IT Briefcase Exclusive Interview: The Cloud Security Skills Crisis

November 14, 2017 No Comments

It’s no secret that a security skills gap is hindering cloud adoption. In fact, 49 percent of companies are delaying cloud deployment because of this issue. Enterprises of all sizes are under mounting pressure to cultivate the necessary cloud security skills for migration. That said, how can organizations safely get to the cloud before it’s too late? Srini Vemula, global product management leader of SenecaGlobal, shares more on how companies can minimize risks brought on by a lack of cloud security and address the growing skills gap.

Democracy Being Threatened By Social Media Bots

November 14, 2017 No Comments

Can social media bots, which are tiny pieces of software, which perform automated tasks potentially, influence humans on social media platforms? Ever since the 2016 elections investigators from the Congress have been questioning social media companies after fears that bots were deployed for influencing public opinion during the presidential elections.

New Banking Trojan IcedID Discovered by IBM X-Force Research

November 13, 2017 No Comments

IBM X-Force research follows developments in the financial cybercrime arena to map the events and trends that shape the threat landscape for organizations and consumers alike. After a year that has been very active in terms of banking malware, point-of-sale (POS) malware and rampant ransomware attacks, the X-Force team identified a new banking Trojan active in the wild dubbed IcedID.

News

What To Check When Your Wi-Fi Is Giving You Problems

November 13, 2017 No Comments

Wired network infrastructure in an office is limiting because you don’t have the freedom to move around with your machine when you want to. Installing a wireless infrastructure comes as a relief and you certainly will enjoy the freedom of working at any location of your office and even out in the compound when you feel like it.

Featured Articles

How to Determine If Your Security Systems Are Working

November 13, 2017 No Comments

How well are your company’s security systems working? In our closely-connected world, it can be hard to tell if your data is fully protected from hackers, scammers and others who would want to use it for nefarious purposes. We’ve all seen what can happen when people’s sensitive information is compromised: customers and clients panic, companies scramble to reassure those who are affected and to remedy the situation and security teams start thinking about what they could have done to prevent a breach in the first place.

Transitioning to Digital: Steps to Make Your Online Debut

November 9, 2017 No Comments

The potential of the Internet is limitless, and it’s changing every day. If your small business isn’t already online, it should be. Not only can having an online presence increase your sales, but it could also increase your reputation and credibility. Today, consumers need to trust a store before they buy from it, especially if it’s online and they can’t see the physical object for themselves. To make the transition to digital, however, you need to do it right.

Io-Tahoe unveils new sensitive data discovery solution to enable compliance with the General Data Protection Regulation (GDPR)

November 9, 2017 No Comments

Io-Tahoe LLC, a pioneer in machine learning-driven smart data discovery solutions that span data lakes and relational databases, today unveiled a new offering to enable customers to quickly and comprehensively address requirements for the

News

GDPR Compliance and Fines May Affect Almost 80% of Organizations Surveyed

November 9, 2017 No Comments

Today HyTrust, Inc., a leader in workload security solutions, announced findings from its latest cloud adoption survey conducted at VMWorld 2017. The survey of 323 respondents assessed deployment decisions for cloud infrastructure, containers and workload security along with risk and compliance from cloud deployments. The most significant result was the large number of companies that are not prepared for General Data Protection Regulation (GDPR) compliance that takes effect in May 2018.

News

5 New Technoligies You Should Embrace in Your Business

November 9, 2017 No Comments

Increased productivity does more than just get projects executed seamlessly. It helps a lot in cutting costs and saving a lot of quality time which improves the overall ROI. With the ever changing technology trends in the business sector, if you don’t embrace new technologies as soon as they emerge, you might find yourself playing a very tricky game of catch-up in order to stay ahead of the curve and be relevant in your sector. Currently, even smaller players or small business owners have also started maneuvering quickly in order to take advantage of newer technologies whenever they emerge unlike it was in the recent past.

IT Briefcase Exclusive Interview: How to Identify & Avoid Customer Friction

November 9, 2017 No Comments

NTT DATA Services recently released its latest Customer Friction Factor (CFF℠) Assessment, Friction Challenges for the Consumer Packaged Goods Industry, confirming that consumers’ online experience impacts the bottom line for CPG companies. Matthew Leach, Vice President, Digital and Application Services from NTT DATA Services offers some insight on customer friction and why CPG companies should make customer experience a priority for business growth.

3 Ways to Simplify Your Legacy IT Infrastructure

November 8, 2017 No Comments

Outdated legacy technology is wasting companies’ time and money. Software maintenance and development consumes 25 percent of IT budgets. Fifty percent of this is spent on legacy software maintenance and enhancement, while 45 percent goes to customization, including 27 percent spend on new application development, reports the Society of Information Management.

Active Directory Management Mistakes to Avoid

November 8, 2017 No Comments

Managing an Active Directory environment can be very technical and require highly skilled IT staff to operate. But nobody is safe from making mistakes. And the more basic those mistakes are, the harder it can be to notice. It’s often the management’s task to look into your system and identify them. In this article we’ll discuss some of the most common mistakes in AD management and what you can do to avoid them.

IT Briefcase Exclusive Interview: The Glitch Economy

November 8, 2017 No Comments

with Dalibor Siroky, PlutoraIn this interview, Dalibor Siroky, CEO and co-founder at Plutora, answers some questions about the impact of the glitch economy. Read More >>>

Mobile Apps Evolution in Our Life

November 8, 2017 No Comments

Do you remember when mobile applications became a part of our lives? When did they cross the line between entertainment and business? When did they transform from simple games into professional tools increasing the business and the revenue?

IT Briefcase Exclusive Interview: Getting Into Google’s Buganizer

November 8, 2017 No Comments

Security researcher Alex Birsan was able to gain access to some of Google’s most critical and dangerous vulnerabilities by finding and exploiting a series of flaws in the company’s internal bug tracker called Google Issue Tracker or “Buganizer.” By spoofing a Google corporate email address, he was able to gain access to the back-end of the system and thousands of bug reports, including those marked as “priority zero,” vulnerabilities which are the most severe and dangerous and enable the greatest amount of damage.

Why Selling Online is Still a Challenge in some B2B Markets and Tips to Successfully Make the Transition

November 7, 2017 No Comments

In many B2B sectors, especially those with more complex distribution channels, the move to selling online has come with a variety of challenges. Dealers and distributors who have launched their own eCommerce solutions are confronted with the expense and fatigue which comes with managing large amounts of product and pricing information, while also attempting to integrate their legacy investments into a new, digital model.

SlashNext Launches Industry-Leading Internet Threat Protection System

November 7, 2017 No Comments

SlashNext, a provider of third-generation Internet security solutions, today announced the company’s broad market release of the SlashNext Internet Access Protection System to protect organizations from cross platform social engineering and phishing, malware, exploits and callback attacks. The system goes beyond first generation signature-based and second generation sandbox-based technologies and deploys human-like intelligence and cognitive thinking to stop these Internet attacks targeting unsuspecting employees as their entry points.

News

IT Briefcase Exclusive Interview: Transforming to Meet the Needs of the Digital Economy, with Achievable Baby Steps

November 7, 2017 No Comments

Efficient and cost effective file management, that enables organizations to glean the greatest value from its data, has been pushed to the top of most organization’s strategic initiatives list. Today, we speak with Data Dynamics’ CEO, Piyush Mehta regarding why this is such an important topic, and why it is critical for transforming to meet the needs of the tomorrow’s digital economy.

ADVERTISEMENT

Gartner Infrastructure


Gartner Application Strategies


IBC 2017

ITBriefcase Comparison Report