Inside the Briefcase


IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

with Srivats Ramaswami, 42Q
In this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages...

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

with Sander Barens, Expereo
In this interview, Sander Barens discusses new solutions and evolutions driving internet into exciting places today and keeping enterprise business ahead of the game, from managed internet networks to SD-WAN services. Read More >>>





Briefcase Highlights


SECURITY

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

July 27, 2017 No Comments

with Srivats Ramaswami, 42QIn this interview, Srivats Ramaswami, CTO and Vice President of IT at 42Q, takes a look at the differences between legacy, on-premise and cloud-based MES solutions and why moving to the cloud provides competitive advantages in efficiency and cost. Read More >>>

The Ultimate Guide to Container Security

July 24, 2017 No Comments

Securing any type of software environment is a big task. But if you use containers, constructing and enforcing a solid security program can be especially difficult. That’s because a containerized environment involves so many different layers as compared to other types of infrastructure. With virtual machines, you have only a host operating system (OS), a guest OS, and a guest application environment to secure. On bare metal, and in most types of cloud-based environments, the security situation is even simpler because there are fewer layers of software.

On the Dock and on the Books – Paying Ransom to Law-Breaking Hackers

July 19, 2017 No Comments

So-called “ransomware” has been making headlines again, most recently with the WannaCry malware. The computer code encrypts files on computers, making them inaccessible to the owners. A certain sum of money, usually in the form of Bitcoin, is demanded by the attacker in exchange for being sent the “key” needed to decrypt the files. The malware can infiltrate any type of device connected to the internet: servers, desktop computers and laptops, even smartphones.

IT Briefcase Exclusive Interview: Become a Cloud Catalyst, Not a Cloud Road Block

July 19, 2017 No Comments

with Brian Kelly, CloudGenaIn this interview, Brian Kelly, CEO & Founder of CloudGenera provides insights on the current challenges in selecting the right cloud solution to satisfy businesses specific individual needs, and how CloudGenera is helping companies, like Hewlett Packard Enterprise (HPE), overcome them. Read More >>>

IT Briefcase Exclusive Interview: Cloud Security Jiu-Jitsu

July 19, 2017 No Comments

with Jack Kudale, LaceworkIn this interview, Lacework CEO Jack Kudale discusses the challenges of cloud computing today and how to overcome cloud security challenges. Read More >>>

First Comes Cyberattacks, Then Comes Business Losses

July 17, 2017 No Comments

Any business that is at the receiving end of a cyberattack will have its fill of distractions to stem the course of the attack while recovering lost or frozen data and mollifying customers whose personal information might have been compromised. Many targeted businesses, however, subsequently discover that a cyberattack and its consequences are only the beginning of their problems.

IT Briefcase Exclusive Interview: How All-flash Storage Helps Retailers Stay Competitive

July 12, 2017 No Comments

with Sundip Arora, KaminarioIn this interview, Kaminario, shares his take on how this rapid increase in retail technology means retailers must implement a solid storage backbone to handle the exponential growth of data and stay ahead of their competition. Read More >>>

IT Briefcase Exclusive Interview: How Automation and Machine Learning Are Solving the Technology Staffing Crunch

July 11, 2017 No Comments

with Gabby Nizri, AyehuIn this interview,Gabby Nizri, Co-Founder and CEO of Ayehu Inc., discusses how automation, machine learning and artificial intelligence are being used as a force multiplier to help organizations overcome the staffing crunch and operate at peak performance. Read More >>>

IT Briefcase Exclusive Interview: Digital Collaboration – Shaping the Enterprise’s Evolution

June 29, 2017 No Comments

with Daisy Hernandez, SAPIn this interview, VP of Product Management for SAP Jam Collaboration, Daisy Hernandez, shares her thoughts on how the adoption and application of digital collaboration are shaping the evolution of the enterprise. Read More >>>

IT Briefcase Exclusive Interview: Internet Connected Devices and Data Protection in SMBs

June 29, 2017 No Comments

Businesses continue to see an uptick in IoT devices used within the office, but often times are not taking the appropriate measures to track and secure these seemingly innocuous devices. Andrew Newman, CEO and founder of Reason Software Company, shares his insight on internet connected devices in small-to-medium businesses and how these companies can keep themselves protected from IoT-based attacks.

Internet privacy…is it a thing anymore?

June 28, 2017 No Comments

Edward Snowden’s leak about massive government surveillance happened almost four years ago, but the debate about internet privacy is far from over. Net neutrality is under threat, and Internet Service Providers (ISPs) work to collect and share your data with the US government. The UK government has repeatedly called for investigation into encrypted messaging platforms like WhatsApp. The internet we all know and love is under threat.

New Research Shows Cybersecurity Battleground Shifting to Linux and Web Servers

June 27, 2017 No Comments

WatchGuard® Technologies, a leader in advanced network security solutions, today announced the findings of its quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. Among its most notable findings, the report revealed that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017.

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

June 27, 2017 No Comments

with Sander Barens, ExpereoIn this interview, Sander Barens discusses new solutions and evolutions driving internet into exciting places today and keeping enterprise business ahead of the game, from managed internet networks to SD-WAN services. Read More >>>

IT Briefcase Exclusive Interview: Driving Data Decisions Throughout the Development Lifecycle

June 27, 2017 No Comments

with Keith Fenech, RevulyticsIn this interview, Keith Fenech, VP, Software Analytics at Revulytics, speaks with IT Briefcase on how collecting and analyzing software usage data can help developers make faster, more efficient decisions at all stages of the development lifecycle. Read More >>>

IT Briefcase Exclusive Interview: The Evolution of The IoT and Data Management

June 26, 2017 No Comments

In today’s always-on, connected world, exponential data growth driven by the Internet of Things (IoT) is placing unprecedented demands on the data center, and current IT environments are struggling to handle the influx. To address continuously changing data center needs, IT managers are turning to converged and hyperconverged solutions to simply and quickly deploy IT.

Wireless Sensor Networks: What IT Needs to Know to Successfully Manage Them

June 20, 2017 No Comments

In addition to contributing to the exponential increase in data, security concerns, and strain on enterprise networks, the growth of the Internet of Things (IoT) is creating demand for upgraded wireless sensor nodes in the enterprise. And as IoT becomes more prevalent in the enterprise, the ease with which we as IT professionals can deploy and create sensor networks increases in tandem.

DevOps & Security: Top 4 Myths Debunked

June 20, 2017 No Comments

In DevOps, when you’re deploying hundreds, possibly thousands, of features and bug fixes a week, security cannot afford to be an afterthought. The beautiful thing about DevOps is that it is a process that continues to get more streamlined, faster and efficient – and deployments will be that much better if they are also fully secure before release time comes.

IT Briefcase Exclusive Interview: Heuristics, Virtualization and the Future of Web Application Protection

June 16, 2017 No Comments

with James E. Lee, WaratekIn this interview, an expert in data privacy and security, Waratek EVP James E. Lee dives into a common method of protection in web application security, why it’s problematic and where the industry is headed. Read More >>>

3 Cybersecurity Trends to Watch for in 2017

June 15, 2017 No Comments

Although the internet is one of the greatest game changers of the 20th century, it comes with its own share of issues. Security breaches have continued to plague the cyberspace, leading to losses of billions of dollars. In fact, according to Forbes, cybercrime is expected to have cost the US economy $2 trillion by 2019. And what’s more frightening is that there appears to be no definite solution to cybercrime in sight. In fact, the advent of the IoT is expected to make cybersecurity even more difficult to enforce.

PLAYING DEFENSE AGAINST HACKERS IS LIKE A NINE-INNING BASEBALL GAME

June 15, 2017 No Comments

In baseball, there are few plays more exhilarating, more memorable and more impactful on the final score than a long home run. But, as any fan can tell you, home runs aren’t the only way to take down an opponent. In baseball there are plenty of ways to score. Some of them aren’t as picturesque as a long ball, but they all inflict certain degrees of damage. Defenses have to do their best to prepare for every occurence and prevent the other team from scoring.

Seven DLP Features to Help Maximize Data Protection

June 14, 2017 No Comments

It’s a familiar refrain: Cloud services and mobile devices have made the challenges of safeguarding company data even more acute. Sensitive information now travels far beyond the relative safety of in-house networks into consumer cloud storage services where it’s accessed by employees using unsecured mobile devices. Yet while these risks are well understood, the number of data breaches continues to rise.

No Summer Vacation for Cybersecurity

June 14, 2017 No Comments

We all wait for the summer to take some time off, unwind and recharge. And while summertime might be downtime for you, that’s not the case for cyber-attacks, which are increasing in an alarming rate: from the most recent ransomware attack using the WannaCry computer worm, which crippled operations worldwide, to sophisticated nation-state activities, attacks directly on banks such as the SWIFT attack, and new areas such as the DDoS attacks using IoT botnets.

Infographic: Out with the Old, In With the New

June 5, 2017 No Comments

Sixty Nine percent of businesses have security solutions that are outdated and inadequate. View Infographic

Reduce Your Risk: The Basics of Encryption and Compliance

June 1, 2017 No Comments

Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm’s reputation while meeting clients’ cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.

Data Security, the Biggest Problem for Enterprise

May 30, 2017 No Comments

Enterprise organizational leaders worry about growth, sales and profits, but should they not be equally concerned about security? Of course. While there are many factors contributing to the success of an organization, one of the threats are security risks, that if arise, can effect an enterprise more than even a period of low sales or decreased growth rate.

The Threats to Network Security Are Rising – What’s an Enterprise To Do?

May 24, 2017 No Comments

Businesses are grappling with new threats to network security, as rising challenges from evolving malware to the emerging Internet of Things landscape and beyond put networks and sensitive data more at risk. Jeff Finn, CEO of zvelo, offers his insights into the state of network security today, and what businesses need to be aware of in addressing these threats.

The big security threats your organization needs to take seriously now

May 23, 2017 No Comments

As a security expert, you’ve seen dozens of top-10 lists and other articles about the major security threats your organization faces. But there are two threats you may not be taking seriously enough.

WannaCry? Spare the Tears with a Health Check

May 19, 2017 No Comments

By now, unless you are living under a rock or have gone into some sort of self-imposed exile, you’ve heard about the havoc WannaCry is wreaking on PCs worldwide. In no time at all, this sneaky worm took advantage of systems that had yet to apply a patch for certain vulnerabilities. Shooting across tens of thousands of organizations on Friday, WannaCry affected more than 300,000 systems in over 150 countries, and it’s being dubbed the biggest ransomware offensive in history.

5 Elements of Secure Work at Home Programs

May 16, 2017 No Comments

The practice of allowing employees to work from home has skyrocketed in recent years. This model allows employees to be more productive and gives companies access to a wider pool of talent and lower overhead costs. With these strong drivers pushing the trend, more than 50 percent of the workforce is expected to work remotely by 2020, according to Fast Company.

Why Adaptive Security is Critical Today, and How to Achieve It

May 11, 2017 No Comments

In 2004, the global cybersecurity market was worth $3.5 billion – and in 2017 Cybersecurity Ventures expects it to be worth more than $120 billion. In other words, the cybersecurity market grew roughly 35-fold in 13 years. This huge increase in spending is being fueled by the dozens of zero-day threats, millions of new malware variants and other attack types that organizations both large and small face each year.

ADVERTISEMENT

Gartner Financial


IBC 2017

ITBriefcase Comparison Report