Inside the Briefcase

Briefcase Highlights


How Hackers “Slurp” Up Your Cloud Data

September 19, 2019 No Comments

The cloud can be a huge asset for most businesses. By leveraging the capabilities and services provided by cloud service providers, organizations can offload many of the problems and responsibilities of maintaining their own infrastructure to a third party and take advantage of the cost savings and scalability available in the cloud.

Types Of Security For Your iPhone: A Guide

September 18, 2019 No Comments

Whether you’ve invested in a new iPhone for business or personal use, keeping it running efficiently comes down to how secure you keep it. Malware affects smartphones just as it does personal computers, and so it’s paramount that we keep our smartphones safe some cybercrime. This is particularly pertinent if you use your personal phone as your business phone. Bring your own device schemes (BYOD) do sometimes leave, companies open to the threat of potential cybercrime.

IT Briefcase Exclusive Interview: Changing the World of Brand Tracking

September 16, 2019 No Comments

In this interview, we talk with Rytis Jakubauskas, General Manager at Latana, about the changing world of brand tracking. Rytis discusses the need for a more innovative and reliable brand tracker in the market – and why the Latana team decided to build just that.

Webinar: How to prepare your data pipeline for machine learning and AI

September 12, 2019 No Comments

Join Amazon Web Services (AWS) and global intelligence provider, IDC, for a training-based session on transforming your data to power machine learning and AI projects. Learn how to prepare data pipelines that automate your machine learning and AI workflows, use AWS Data Pipeline to automate data movement and transformation, unlock insights that fuel your business, and explore software solutions in AWS Marketplace that make your data analytics-ready.

IT Briefcase Exclusive Interview: Predictive Prioritization: A Data Science-based Process

September 6, 2019 No Comments

Earlier this year, Tenable introduced Predictive Prioritization, a data science-based process that helps security teams focus on the 3% of vulnerabilities that matter most. Here, we answer the top 10 questions about what this capability means for your vulnerability management practice. For a closer look at Predictive Prioritization, check out the interactive demo.

External Security Technologies to Protect Your Privacy

September 4, 2019 No Comments

In the real physical world, there’s not always a rigid system put in place to ensure important documents of yours, or even your technological devices, aren’t broken in to. You really have to make the effort to protect yourself and your valuables, both online and in the home. Here, we are looking at certain technologies that are the best for ensuring the wrong people don’t get into your personal spaces.

What Is Code Unit Testing?

August 27, 2019 No Comments

When it comes to mapping out the DNA of your code, there is a lot that goes into it, including the testing phase. You want to be able to spot all possible issues and anomalies, and also find the root cause and make sure that gets to the right person. You never want code that’s poor quality to be moved to production, and with that in mind, it’s important to understand all aspects of testing and quality control.

Best Android Security and Antivirus apps

August 23, 2019 No Comments

Unarguably, Android is the most extensively used operating system on the planet. It implies that it is essential to have the best security apps and antivirus tools for Android installed on your Android used phones , as Google’s OS is often targeted by malware because of its ubiquity. Whatever software you use with your Android phone or tablet, you’d be insightful to have an antivirus or a security app installed on your device. In this article, we’re going to feature 6 of the top antivirus apps for Android in 2019 — most of which are free apps to download.

Choosing the Right DCIM Solution

August 23, 2019 No Comments

With the ever-expanding complexity of IT configurations and environments found in today’s data centers, choosing the right data center infrastructure management (DCIM) solution for your facility can be something of an involved proposition. At minimum, you want to ensure your choice will facilitate the management and monitoring of all assets and identify optimization methods, while contributing to maximum uptime and availability.

What Does Homeland Security Say About DNS Hijacking?

August 22, 2019 No Comments

Domain Name Systems and their security and protection should be a top priority for businesses and organizations. DNS is one of the biggest points of weakness for businesses in the United States and abroad, to the point, it’s recognized by the federal government. The interruption of DNS can cause a ripple effect throughout an organization, and this is increasingly being seen in institutions and businesses. There has been mounting media attention on the risks of DNS hijacking and what organizations can do to prevent it.

Demystifying Common GDPR Terms

August 22, 2019 No Comments

Back in May, the world marked the one-year anniversary of the General Data Protection Regulation, or GDPR as it’s now commonly known. Over the course of the year, GDPR and related stories were rarely out of the headlines. GDPR was mentioned in seemingly every story written about data privacy if not covered exclusively. In the wake of all the hype, companies around the world with a data presence in the EU spent millions to comply with the newly passed regulations. GDPR was, and in many ways remains, everywhere.

How the SSL Protocol Changed the Internet

August 6, 2019 No Comments

Today, cybersecurity is not optional, it’s mandatory. There have been many initiatives to secure the internet as a whole, including some moves by key stakeholders. One of these measures is the Secure Sockets Layer or SSL, which has become so prevalent that it now encompasses all online communication, from website SSL certificates to SSL proxies.

Why You Need To Use VPNs on Mobile Phones

August 6, 2019 No Comments

The development of mobile Internet technologies has allowed people to use phones for surfing the Web. Mobile gadgets are used not only to search for the necessary information but to communicate in social networks, make purchases, conduct financial transactions, work in corporate networks, etc. But how to make these actions totally safe and anonymous? You just need to use a VPN.

How to make cybersecurity part of your arsenal

July 31, 2019 No Comments

As an IT technician or contractor, your job is to make people’s life easier by fixing and improving their security systems. One easy way to prevent a system from malfunctioning is to improve its cybersecurity. Viruses and hackers can cause computers to run slowly and also be the culprit of large data losses. Having cybersecurity will not only be reassuring to potential customers, but it will also benefit your own personal computer systems.

Making Sense of PCI Compliance

July 24, 2019 No Comments

The Equifax data breach ended in the exposure of the personal information of 143 million people, including their credit card details. This breach serves as an example of the threat that comes with advancements in technology. While Equifax is equipped enough to survive such disasters, small businesses, and startups that are only gaining a foothold in their industries might not always have the same luck.

The novice’s guide to DNS hijacking

July 18, 2019 No Comments

DNS hijacking is a serious cybersecurity threat. Compromised DNS can be used to serve you spam advertisements and to direct you to phishing websites, which are designed to steal things like passwords and bank credentials. While DNS hijacking poses a real danger to your online activity, it is unfortunately something that many people have never even heard of.

Your network can help you spot data breaches early – here’s how

July 16, 2019 No Comments

There is no doubt that network security is a critical component of a digital world. It has become an almost daily occurrence to wake up to news headlines about how companies have been hacked into. The consequence is almost always dire to both the company that owns the network and their clients, whose personal and financial data is stolen.

The Different Types of Cybersecurity Threats to Your Organization

July 3, 2019 No Comments

According to recent reports, 2019 has already proved to be a successful year for hackers, as millions of records and credit card data have been stolen, and healthcare organizations have experienced a considerable amount of medical data leaks.

IT Briefcase Exclusive Interview: Kubernetes Security & Compliance: How Software Development is “Shifting Security Left”

July 3, 2019 No Comments

with Tim Hinrichs, StyraIn this interview, Tim Hinrichs, CTO and Co-Founder of Styra and Co-Founder of Open Policy Agent shares insights about how software development teams are “shifting security left,” focusing on prevention, rather than detection.Read More >>>

2019 Cyber Security Report: Learn How to Survive Today’s Targeted Cyber Attacks

June 17, 2019 No Comments

The 2019 Security Report includes a thorough analysis of what today’s security threat trends are. Also learn where your weakest links are, security threat predictions, and recommendations on how to protect your organization from being tomorrow’s next victim.

Protecting Your Customers Against Cybercrime

June 13, 2019 No Comments

Ecommerce shoppers have stated security is one of their primary concerns about shopping online in survey after survey, Meanwhile, the cost of cybercrime is projected to exceed six trillion dollars annually by 2021. The plausibility of this becomes undeniable when consider the likes of the CIA has been hacked. In an environment such as this, protecting your customers against cybercrime becomes paramount to the successful functioning of your business.

6 Cybersecurity Policies Every Business Needs to Implement

June 10, 2019 No Comments

With over 80% of business information stored in the cloud, information security is now a necessity rather than an option. Important and sensitive information needs to be protected using the right security measures to prevent them from falling into the wrong hands. Of course, security measures are not the only instruments to use for better cybersecurity.

Is using Free Wifi safe for my data? Not unless you do this!

June 10, 2019 No Comments

It can be tempting to hook up to the free Wifi offered at cafes, restaurants, airports or any other place. However, is keeping up to date with what your friends are doing on Facebook or sending an email important enough to risk having your personal details stolen? This is something you should ask yourself when considering connecting to a public network. The bigger question is, is using free Wifi safe for my data. The answer is no, not unless you protect yourself beforehand.

Covering Your Risks: Technology for Business Security Is Improving

May 24, 2019 No Comments

When your business security is lacking, it can not only cost you, but your customers, vendors and suppliers as well. If your company is like so many others, safety and security issues are not uncommon and are threats to your information security and data privacy. Luckily, technology is evolving at a rapid pace, and many of these changes are to your benefit. Improvements in this space are moving at such a fast pace that there are more options when it comes to security and alarm systems for commercial buildings than ever before.

What are the most successful IT sectors?

May 15, 2019 No Comments

The information technology industry can possibly reach $5 trillion in 2019, generating significant revenue and employing workers at a high median wage. It is the world’s third-largest economy in terms of GDP, growing at a rate of 4,0%, according to CompTIA. IT has the power to set the markets in motion and create transformative business value across numerous industries. The digital revolution has transformed information management and applied technology within the global economy.

Cyber Security Tips for Businesses to Prevent Cyber Attacks

May 15, 2019 No Comments

As more and more businesses are running and managing their most of operations and processes online, it is most vital to protect a business or brand against cyber security threats in this digital world and to get more from the opportunities offered by the virtual world. No doubt, the world of internet offers all businesses the potential for reaching a bigger audience and use international suppliers to grow more, but it also brings the potential for scams and cyber security risks as well. Even a single cyber security attack can harm your repute and can also cause a serious financial upset. Here is a comprehensive list of cyber security tips for businesses to prevent cyber-attacks that any business can assume to maintain customer trust and confidence.

Why Internet Safety Is Even More Important In Today’s World

May 9, 2019 No Comments

Because of the advent of technology, it’s now easier to get things done. If you’re an employee, you can accomplish several tasks in front of your computer without the need to leave your desk or office. If you’re a student, you can research through hundreds of resources while staying in the comfort of your own home. Sure, technology can offer a lot of benefits, but on the other side of the coin, it has also increased the risk of identity theft and data breach. These are just some of the reasons why internet safety is more critical in today’s world.

7 Cybersecurity Trends in 2019

May 7, 2019 No Comments

Cybersecurity is one of the exciting spheres promising radical changes in our lives. Since our world is becoming more connected with digital technologies such as AI, Machine Learning, IoT, Blockchain and other, web threats continue to grow. It’s no secret, insidious hackers can easily penetrate any computer’s defenses and start blackmailing you, encroaching on your property and reputation, even if you have positive security aspect. But fortunately, today people have a variety of useful tools and services to deal with such criminals.

Securing Your Website in 2019

May 1, 2019 No Comments

Attacks on websites have been a norm since the advent of the internet. Regrettably, this trend is not expected to slow down considering that hackers have become more aggressive now, more than ever. Even bad news, especially to small business owners, is that hackers are indiscriminate. They can attack just about any website that contains unpatched vulnerabilities. This means that whether you’re a startup, a mid-sized business or a large enterprise, you can be hit next.

6 Digital Transformation Trends To Watch For In 2019

May 1, 2019 No Comments

More and more businesses are looking to technology to address process, model, and resource challenges. While many digital transformation trends aren’t yet a fit or don’t perform at a high enough level to provide universal business value, there are other upcoming solutions that show a great deal of promise.