Inside the Briefcase






Briefcase Highlights


SECURITY

Your First Custom App: Getting Started

September 27, 2016 No Comments

Every day, organizations and individuals are experiencing the power of custom apps to improve productivity, increase efficiency and achieve desired outcomes. For those uninitiated, getting your first custom app off the ground can be intimidating. However, there are a few concrete steps that you can take to move your idea from imagination to implementation. These steps and core concepts have been distilled from the best practices of many people – and teams – who have planned their own custom apps and are using them to their advantage. By following these steps, you’ll be harnessing the power of custom apps in no time.

IT professionals need skills mix to address emerging network and data security demands

September 22, 2016 No Comments

Once upon a time in IT, it was enough to build a strong high wall around the enterprise garden. Build it sturdy enough, and the organization’s network and information would be safe. These days, the wall alone will not work. The modern approach goes far beyond simple architecture and perimeter controls. It mandates an additional focus on security operations, which includes making all employees, regardless of job title, part of the security effort. Cybercriminals are no longer just clawing at the front door. They are undermining bricks, tunneling under walls and launching Trojan horses.

Why Data Security Is Key for Customer Retention

September 21, 2016 No Comments

Tweet Featured article by Thea Millard, Market Data Analyst Customer care can be the defining factor that makes a difference between a successful company and a failing one. All other tasks and activities derive from the connection between product and client. Marketing may be the most volatile field in business, but one thing is always […]

5 Ways to Prevent Data Breaches

September 19, 2016 No Comments

In a world where data is one of the most valuable assets a business and individual has, security breaches have become increasingly common. Better hardware and software tools for deterrence are being developed, but so are the malware and methods being used to punch holes through them. As a business owner, you have to accept the unfortunate reality that threats no longer just exist in physical form. A digital war between good and evil is transpiring as we speak and it is your duty to make sure your castle is well-prepared to defend its treasures of data. Here are five ways to prevent data breaches.

How Companies Can Ensure Stronger Mobile Security

September 15, 2016 No Comments

The modern business environment has upended some long-standing traditions. Many employees are now expected to work not just at the office from their desktops, but from home as well, on devices like smartphones, laptops, and tablets. The BYOD phenomenon has transformed industries across the country, as employees are now always in reach. As a result, the traditional 9-to-5 work day is quickly becoming blurred.

PaaS Adoption Inevitable for Most Applications

September 14, 2016 No Comments

I am increasingly convinced that the eventual adoption of Platform as a Service (PaaS) offerings is inevitable for most applications even if the number of applications built on top of PaaS offerings is relatively low today. What do I mean by PaaS? Services that sit above the more traditional Infrastructure as a Service (IaaS) that most people today equate with cloud computing.

Wikibon Cube Conversation: Modernizing Data Protection

September 14, 2016 No Comments

A fundamental goal of any IT organization should be to protect, preserve and serve data and information in a cost-effective as well as productive way. This webcast discusses ways in which today’s organizations can safely and securely modernize their data protection within the context of the Wikibon Cube Conversation.

ESG Video Interview Webinar: IBM Data Protection Modernization and Strategy

September 14, 2016 No Comments

In this webcast, Enterprise Strategy Group Principal Analyst, Jason Buffington, and IBM Senior Technical Staff Member, Greg Van Hise discuss a range of data protection modernization issues that businesses are facing today, and strategies to help overcome these challenges.

From Car-Jacking to Car-Hacking: How Vehicles Became Targets For Cybercriminals

September 12, 2016 No Comments

As cars are “smarter,” protecting them requires more than locking the doors and closing the windows. Electronic entry, Wi-Fi, computer sensors that enable self-driving or automatic stopping measures, and on-board global positioning systems can encourage safer driving. Cars are also equipped to record data that can reveal safety problems in the car or how a crash occurred. An estimated 95 percent of auto crashes involve human error.

Information Security and Data Privacy Practices

September 6, 2016 No Comments

This white paper discusses several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.

Social Login 101: Everything You Need to Know About Social Login and the Future of Customer Identity

September 6, 2016 No Comments

Social Login 101. Everything You Need to Know about the Future of Consumer Identity.

Balancing Personalization and Trust in the Age of the Customer

September 6, 2016 No Comments

Consumers have gotten a raw deal, pressed to provide valuable, personal information to companies while receving little or no benefit, often putting themselves at risk of fraudulent activity, or of receiving endless irrelevant spam.

Forrester Report – Market Overview: Customer Identity And Access Management (CIAM) Solutions

September 6, 2016 No Comments

This report provides an overview of the developing Customer Identity and Access Management market segment and recommendations for implementing a solution that will help you consistently deliver brand-building customer experiences.

Safe data-keeping for medical records: A quick how to guide.

September 1, 2016 No Comments

With more techno-progress in the health sector every day, hackers haven’t left any chance to gobble data from this industry as well. Digitized records have become quite easy to steal. Privacy has become an illusion. Identity theft and record corrosion have become frequent, that too on a global scale. The data hacked in Germany gets used in the USA and so on (the horrors it has caused). Every time you visit a doctor’s office, hospital or an institute, your medical records are updated. With each entry, the probability of data leaks spikes to 1 in 50,000. Can you imagine the amount of data gobbling that can happen among the world population?

Security industry must embrace modern PTT technologies for a more profitable, secure and efficient working environment

August 31, 2016 No Comments

The global security industry is growing at a rapid pace. More professional and coordinated operations across disciplines and geographical borders among criminals, is one of the drivers of the increased demand for advanced security services. This calls for more intense surveillance and security, according to the Europol “Serious and Organized Crime Assessment Report”. Gartner puts the global security market at $86bn, with annual growth of close to nine percent, citing “growing complexity of attacks”.

On Storage: A Conversation with IBM Experts

August 30, 2016 No Comments

Big data, analytics, and especially mobile are disrupting the marketplace, and your customers need to understand the implications and opportunities inherent in the new marketplace. This webcast outlines ways to become a trusted source of knowledge and information on storage options for your customers.

IBM FlashSystem V9000 and VMware Best Practices Guide

August 30, 2016 No Comments

This IBM® RedpaperTM publication describes best practices for deploying IBM FlashSystemTM V9000 enterprise storage system in a VMware vSphere environment. It includes guidelines and examples of the latest FlashSystem V9000 hardware and software, integrated with VMware version 6, to demonstrate the business benefits these solutions.

Linguistic analysis of threats and information leakage in financial organizations

August 29, 2016 No Comments

Nowadays, information loss and data leakage in any sphere is one of the most complicated problems to face. Public health corporations are having negative experience in losing electronic record files with personal and protected health information, including Social Security numbers and medical histories. Online shops, in turn, due to authentication bugs are facing a dangerous situation when all customer’s accounts are at risk of a data breach. Another example in this regard is stealing customer records by banks employees before joining the rival.

Data, Backups, and You: A Cautionary Tale in Business

August 29, 2016 No Comments

Believe me when I say I’ve had my share of disruptions when it comes to operating an online business over this past decade. I’ve seen minor setbacks such as accidentally overwriting important files to catastrophic disasters like when my laptop bricked after falling out of my bag. When all of your work is done through a computer – it becomes apparent that you need to take precautions to keep your business files safe and sound.

Security industry must embrace modern PTT technologies

August 22, 2016 No Comments

The global security industry is growing at a rapid pace. More professional and coordinated operations across disciplines and geographical borders among criminals, is one of the drivers of the increased demand for advanced security services. This calls for more intense surveillance and security, according to the Europol “Serious and Organized Crime Assessment Report”. Gartner puts the global security market at $86bn, with annual growth of close to nine percent, citing “growing complexity of attacks”.

How Can Companies Prevent Cyber-terrorism

August 18, 2016 No Comments

According to statistics provided by the Federal Bureau of Investigation, a violent crime occurs every 25 seconds in the United States; meanwhile, the Daily Mail reports that a minor crime is committed in the United Kingdom every five seconds, however, according to a study from the research firm Javelin Strategy & Research, an identity is stolen online every two seconds. Cybercrime is a real crime – it provides more anonymity, it can be more difficult to prosecute and, this may surprise you, it is even more profitable than offline crimes.

Strategies for Defending Against Cyber Attacks on Critical Infrastructure

August 18, 2016 No Comments

Historically, the primary goal of cyber criminals has been to steal data that the criminals find valuable: personally identifiable information, intellectual property and so on. That digital information would then be converted, via fraud or other means, into real-world cash. Today, however, we are being confronted by attacks that directly affect the physical world – those launched against power grids, water systems and other crucial infrastructure.

IT Briefcase Exclusive Interview: Top 5 Must-have Security Features Every USB Drive Should Have

August 16, 2016 No Comments

with Mike McCandless, Apricorn In this interview, Apricorn VP Mike McCandless provides insight into the top must-have security features that every USB drive should contain. Read More >>>

5 Signs Your Website Has Been Hacked

August 15, 2016 No Comments

The estimated annual cost of cybercrime globally is about $100 billion. Dedicated hackers are developing their strategies so well that you may not even know your systems have been hacked until it’s too late. Here are 5 sure signs that your network has been compromised.

Why Are Cyber Thieves Always Steps Ahead of Enterprises?

August 15, 2016 No Comments

A sign of the times is that commuters on buses and trains are known to wrap their credit cards in aluminum foil so their personal information can’t be ‘skimmed’ by nearby cyber thieves. The practice recalls paranoid UFO believers who, in the 1950s, would wear hats made of aluminum foil so that aliens couldn’t read their brain waves. What’s mind boggling about the two stories is that the second was the stuff of nutty conspiracy theorists and the first is a grim reality of being a digital consumer today.

The Three Pillars of Effective Disaster Recovery

August 9, 2016 No Comments

Explore the three pillars that make up a strong and foundational disaster recovery solution: DRaaS, Managed Hosting, and the Network.

IT Briefcase Exclusive Interview: The Rise of Machine Learning Analytics

July 28, 2016 No Comments

with Jerry Melnick, SIOSIn this interview, SIOS Technology President and CEO Jerry Melnick speaks with IT Briefcase about optimizing infrastructure operations and application performance in complex VMware environments. Read More >>>

3 Productivity Killers That Wreak Havoc On Your Workflow

July 28, 2016 No Comments

Automation, cloud technology, and mobile business solutions are the latest tech tools in the corporate arsenal for streamlining operations, improving efficiency, and holding the line on skyrocketing costs. The proliferation of content management systems (CMS), customer relationship management (CRM), marketing automation, and integrated applications reflect the widespread belief that companies who embrace innovative business tools will gain a competitive advantage in the marketplace.

Best Tips from Remote DBA Experts to Help Keep Your Business Data Safe

July 28, 2016 No Comments

Keeping your business data safe is crucial to the success of your business. The last thing you want is for your competitors to gain insight into your product secrets or for sensitive client information to be leaked. Protecting your data is not only important to the success of your business but can also keep you from hefty fines and lawsuits. How can you keep your data safe? This post looks at a couple of things you need to use in order to keep your business data secure.

When it Comes to DNS, Redundancy is a Good Thing

July 25, 2016 No Comments

Business used to be simpler. It used to be possible—in fact, it was the norm—for enterprises to run their Domain Name Service (DNS) from just one data center. They placed their servers within its confines and went on their way without a care. After all, if their one data center went down, the DNS server would be useless.

ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange