Inside the Briefcase


IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

with Srivats Ramaswami, 42Q
In this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages...





Briefcase Highlights


SECURITY

IT Briefcase Exclusive Interview: Using Device-native Capabilities to Secure Devices with Mobility Strategies

September 21, 2017 No Comments

with Henning Volkmer, Cortado Mobile Solutions Inc.In this interview, Henning Volkmer, president and CEO of Cortado Mobile Solutions Inc., shares his thoughts on using device-native capabilities to secure devices implementing productive mobility strategies, as well the benefits, simplicity and cost savings a cloud-based approach offers. Read More >>>

IT Briefcase Exclusive Interview: The Growing and Continuous Threat of Ransomware

September 18, 2017 No Comments

with Linus Chang, BackupAssistIn today’s exclusive IT Briefcase interview, BackupAssist’s CEO, Linus Chang, shares his thoughts on the growing and continuous threat of ransomware, not only across enterprise environments, but the small-to-medium business (SMB) space as well. Read More >>>

IT Briefcase Exclusive Interview: Equifax Data Breach – Protecting Privacy and Avoiding a PR Nightmare

September 15, 2017 No Comments

with Patrick Carey, Black Duck SoftwareIn this interview, Patrick Carey, VP of Product at Black Duck Software, gives his perspective the Equifax data breach and how to protect privacy moving forward. Read More >>>

Why Are Windows 10 Migrations Picking Up Speed?

September 12, 2017 No Comments

Last year, few IT professionals believed they would be close to completing their migration to Windows 10 by this time. Some even estimated that they wouldn’t be at the halfway mark. Given the scale of this mission—migrating thousands of systems without business interruption—this conservative outlook is perhaps understandable.

Customers of the World’s Largest Organizations continue to suffer from Cyber Attacks

September 11, 2017 No Comments

Every day, there appear new pieces of evidence that the world’s Cyber Security (CS) industry still does not correspond to the required levels of safety. Moreover, there is no agency that would be able to eliminate the detected vulnerabilities and resolve the related problems in tight deadlines. As a result, many people have already become victims of hackers, internet offenders who abuse their financial or personal data for personal benefit or just for fun.

IT Briefcase Exclusive Interview: The Value of Security Testing

September 8, 2017 No Comments

While many companies might put security testing at the bottom of their lists, it’s a critical step businesses need to take to ensure their solutions can properly protect and defend against cyber-attacks. There are numerous ways that enterprises can go about the testing of solutions, but it’s important to understand the industry best practices and recommendations when it comes to testing and evaluation.

IT Briefcase Exclusive Interview: Using Deception Technologies to Turn the Tables on Attackers

August 30, 2017 No Comments

with Raj Gopalakrishna, AcalvioIn this interview, Raj, the Co-Founder and Vice President of Architecture at Acalvio discusses what businesses need to know in order to detect, engage and respond quickly to malicious activity on their networks Read More >>>

Why Mobile Security Relies on a Great User Experience

August 30, 2017 No Comments

There’s no doubt that mobile security is a significant concern for individuals and for businesses. In the age of BYOD, organizations simply cannot ignore the risks that come from individual devices — and even consumers themselves are beginning to realize that their beloved smartphones and tablets are a target for cybercriminals. However, as mobile security has become a priority, so has the perception that it takes precedence over everything else, including usability. That’s not to say that user experience is more important, but most developers have struggled to find balance between the two.

IT Briefcase Exclusive Interview: Vector Solutions Boosts IT Security

August 28, 2017 No Comments

The demands of IT security professionals are growing every day. Cybersecurity attacks are not only occurring at unprecedented rates, but the diversity of Cybercrimes is also increasing. Professionals require constant updates to skills and training to stay ahead of the next potential threat. It’s vital to an organization’s security that their staff is well-informed with latest knowledge and training available in the IT field. One of the leading providers of online training is Vector Solutions. We sat down with the SVP of Content and Communications, Victoria Zambito, to learn more about how their IT training and performance support solutions are helping organizations stay safe and ahead of the curve.

We Are Fast Approaching the Era of the Super Hacker

August 24, 2017 No Comments

There is a lot of hype all over the web about Artificial Intelligence being used in cyber security; how Artificial Intelligence will outthink the hackers, even predicting attacks before they happen. Nevertheless, the token has two sides. Those who create cyber security software and those who create hacking tools are of the same flock of birds, only with a different colour of feathers. While designers of cyber security programs are trying to think one step ahead of the villains, the villains are already thinking five to 10 steps ahead. Cyber security is still a reactionary game. While we are looking for the best NBN plans and worried about internet speed, we need to be worried about our security.

IT Briefcase Exclusive Interview: Endpoint Security, Ransomware and the End of Evasive Malware

August 17, 2017 No Comments

with Lenny Zeltser, MinervaIn this interview, Lenny Zeltser, Vice President of Products at Minerva discusses endpoint security, ransomware, and explains how you can ensure prevention before detection.Read More >>>

IT Briefcase Exclusive Interview: The Current State of IT Security

August 17, 2017 No Comments

with Ondrej Krehel, LIFARS LLCOndrej Krehel, CEO and Founder of LIFARS, an international cybersecurity and digital forensics firm, discusses the current state of the security industry and what is in store for the rest of 2017 and beyond. Read More >>>

The 5 Biggest Ways WannaCry and Petya Are Changing Enterprise IT

August 15, 2017 No Comments

In May 2017, WannaCry ransomware hit more than 300,000 computers in 150 countries—including multiple systems at Britain’s NHS, Spanish phone company Telefónica, and German state railways. It spread itself from machine to machine, encrypting hard disks and then demanding ransom to return the data to the owners. Petya followed in June, exploiting the same vulnerability as WannaCry.

Three Things Every Business Needs To Be Disaster-Proof

August 9, 2017 No Comments

Inclement weather. Catastrophic hardware failure. A devastating cyberattack. A disgruntled employee. Even the best-run, most successful company can potentially end up crippled if caught unprepared by any of these incidents. Hardware can be damaged or destroyed. Critical data can end up lost or stolen. Ongoing systems can come crashing down, crushing your lines of business.

IT Briefcase Exclusive Interview: In the New Age of Ecommerce, Fulfillment is the New Battleground

August 8, 2017 No Comments

with Arun Rao, GrandCanalsIn this interview, Arun Rao discusses how to support businesses who are struggling with the “Amazonification” of the fulfillment chain where there are rising costs and rising expectations on delivery times. Read More >>>

New Survey Reveals the Benefits of Integrating Security and DevOps

August 1, 2017 No Comments

DevOps might be the best thing to happen to application security. Although, admittedly, some IT security professionals may not feel that way. First, organizations started connecting their systems and employees to the Internet. Then the introduction of the smartphone launched the BYOD trend, followed by the maturation of cloud computing-based applications and services. These developments created significant new security risks.

Research results provide insight into current DevOps security practices at both large and mid-sized enterprises.

August 1, 2017 No Comments

Research results provide insight into current DevOps security practices at both large and mid-sized enterprises.

IDG Research Services polled IT & security decision makers to gauge their organizations’ application security strategies.

August 1, 2017 No Comments

IDG Research Services polled IT & security decision makers to gauge their organizations’ application security strategies.

DATA and ANALYTICS , Featured White Papers, SECURITY

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

July 27, 2017 No Comments

with Srivats Ramaswami, 42QIn this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages in efficiency and cost. Read More >>>

The Ultimate Guide to Container Security

July 24, 2017 No Comments

Securing any type of software environment is a big task. But if you use containers, constructing and enforcing a solid security program can be especially difficult. That’s because a containerized environment involves so many different layers as compared to other types of infrastructure. With virtual machines, you have only a host operating system (OS), a guest OS, and a guest application environment to secure. On bare metal, and in most types of cloud-based environments, the security situation is even simpler because there are fewer layers of software.

On the Dock and on the Books – Paying Ransom to Law-Breaking Hackers

July 19, 2017 No Comments

So-called “ransomware” has been making headlines again, most recently with the WannaCry malware. The computer code encrypts files on computers, making them inaccessible to the owners. A certain sum of money, usually in the form of Bitcoin, is demanded by the attacker in exchange for being sent the “key” needed to decrypt the files. The malware can infiltrate any type of device connected to the internet: servers, desktop computers and laptops, even smartphones.

IT Briefcase Exclusive Interview: Become a Cloud Catalyst, Not a Cloud Road Block

July 19, 2017 No Comments

with Brian Kelly, CloudGenaIn this interview, Brian Kelly, CEO & Founder of CloudGenera provides insights on the current challenges in selecting the right cloud solution to satisfy businesses specific individual needs, and how CloudGenera is helping companies, like Hewlett Packard Enterprise (HPE), overcome them. Read More >>>

IT Briefcase Exclusive Interview: Cloud Security Jiu-Jitsu

July 19, 2017 No Comments

with Jack Kudale, LaceworkIn this interview, Lacework CEO Jack Kudale discusses the challenges of cloud computing today and how to overcome cloud security challenges. Read More >>>

First Comes Cyberattacks, Then Comes Business Losses

July 17, 2017 No Comments

Any business that is at the receiving end of a cyberattack will have its fill of distractions to stem the course of the attack while recovering lost or frozen data and mollifying customers whose personal information might have been compromised. Many targeted businesses, however, subsequently discover that a cyberattack and its consequences are only the beginning of their problems.

IT Briefcase Exclusive Interview: How All-flash Storage Helps Retailers Stay Competitive

July 12, 2017 No Comments

with Sundip Arora, KaminarioIn this interview, Kaminario, shares his take on how this rapid increase in retail technology means retailers must implement a solid storage backbone to handle the exponential growth of data and stay ahead of their competition. Read More >>>

IT Briefcase Exclusive Interview: How Automation and Machine Learning Are Solving the Technology Staffing Crunch

July 11, 2017 No Comments

with Gabby Nizri, AyehuIn this interview,Gabby Nizri, Co-Founder and CEO of Ayehu Inc., discusses how automation, machine learning and artificial intelligence are being used as a force multiplier to help organizations overcome the staffing crunch and operate at peak performance. Read More >>>

IT Briefcase Exclusive Interview: Digital Collaboration – Shaping the Enterprise’s Evolution

June 29, 2017 No Comments

with Daisy Hernandez, SAPIn this interview, VP of Product Management for SAP Jam Collaboration, Daisy Hernandez, shares her thoughts on how the adoption and application of digital collaboration are shaping the evolution of the enterprise. Read More >>>

IT Briefcase Exclusive Interview: Internet Connected Devices and Data Protection in SMBs

June 29, 2017 No Comments

Businesses continue to see an uptick in IoT devices used within the office, but often times are not taking the appropriate measures to track and secure these seemingly innocuous devices. Andrew Newman, CEO and founder of Reason Software Company, shares his insight on internet connected devices in small-to-medium businesses and how these companies can keep themselves protected from IoT-based attacks.

Internet privacy…is it a thing anymore?

June 28, 2017 No Comments

Edward Snowden’s leak about massive government surveillance happened almost four years ago, but the debate about internet privacy is far from over. Net neutrality is under threat, and Internet Service Providers (ISPs) work to collect and share your data with the US government. The UK government has repeatedly called for investigation into encrypted messaging platforms like WhatsApp. The internet we all know and love is under threat.

New Research Shows Cybersecurity Battleground Shifting to Linux and Web Servers

June 27, 2017 No Comments

WatchGuard® Technologies, a leader in advanced network security solutions, today announced the findings of its quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. Among its most notable findings, the report revealed that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017.

ADVERTISEMENT

Gartner Infrastructure


Gartner Application Strategies


IBC 2017

ITBriefcase Comparison Report