Inside the Briefcase


IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

with Jay Henderson, IBM Commerce
In this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers.




Briefcase Highlights


SECURITY

Why Marketers Need to Put A/B Testing by the Wayside Content

April 20, 2015 No Comments

by Cory Munchbach, BlueConicWhile A/B and multivariate testing has been known to improve the effectiveness of marketing campaigns, newer tools and methodologies that can be implemented today have evolved to become more effective and informative than their predecessors. Read More >>>

If You Think Security Awareness Education is Expensive, Try Ignorance

April 16, 2015 No Comments

Facts surrounding spear phishing all point to employees as the most cited culprits and security awareness training as the most effective remedy. Yet all training programs are not equal.

7 Service Desk Habits of The Avengers

April 16, 2015 No Comments

with Vinit Tibrewal, ManageEngine“If you are an IT help desk technician, you’re a superhero!” You may have heard this many times from your help desk solution provider, if not from your customers and colleagues. Read More >>>

Data Breaches and Third Parties: 5 Questions to Ask Now

April 14, 2015 No Comments

It seems we cannot get through a week without another report of a cyber-attack on a business enterprise. Take, for example, AT&T, Lowes, Target and Home Depot: four major brands with one thing in common. Each of these company’s revenues has recently been directly affected because of a data breach. In every case, the culprit was one of the company’s third parties: an HVAC supplier, a contract manufacturer, and a consultant who, because of lack of visibility and appropriate controls, ultimately cost the company millions of dollars.

Data Protection– What’s Next?

April 13, 2015 No Comments

As the EU finalizes the new EU Data Protection Act, which will likely become law across all EU member states by the end of 2015, I find myself once again turning my attention to data protection. As CEO of Calligo, the trusted cloud, I am eagerly awaiting to see how this new law will change how our data is handled by service providers and enterprises globally.

CA Security Council Report: Consumers Don’t Know Much About Security

April 13, 2015 No Comments

The CA Security Council (CASC), an advocacy group committed to the advancement of the security of websites and online transactions, today released its 2015 Consumer Trust Survey which found that validation matters. While consumers are confused about some aspects of security, they recognize and trust the security that SSL brings to e-commerce sites. Fifty-three percent of respondents identify the padlock as adding confidence in an e-commerce site, with 42 percent associating the green bar and organization name in the URL with greater safety.

The Dyre Wolf Campaign: Stealing Millions and Hungry for More

April 3, 2015 No Comments

IBM Security has identified an active campaign using a variant of Dyre malware that has successfully stolen more than $1 million from targeted enterprise organizations. The campaign, named “The Dyre Wolf” by IBM Security researchers, shows a brazen twist from the once-simple Dyre malware by adding sophisticated social engineering tactics likely to circumvent two-factor authentication. In recent incidents, organizations have lost between $500,000 and $1.5 million to attackers.

Cloud Security Survey both Confirms and Challenges Common Beliefs

April 1, 2015 No Comments

A 2015 survey of over 1,000 cyber security professionals confirms that security remains the biggest barrier to faster cloud adoption, with nine out of ten organizations expressing this concern. The survey explores a wide range of issues, including the specific driving forces and risk factors of cloud adoption, how organizations are currently using or planning to use the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security concerns in public, private and hybrid cloud environments.

COPE vs. BYOD vs. CYOD – How Should an Enterprise Choose?

March 31, 2015 No Comments

by Mitch Black, MOBIRecently, there has been a great deal of debate in the world of mobile devices and how they function in the enterprise. There’s BYOD (Bring Your Own Device) vs. COPE (Corporate Owned, Personally Enabled), and now even CYOD (Choose Your Own Device). Read More >>>

Retail: It’s all about gaining consumer confidence

March 18, 2015 No Comments

It’s no secret that the Internet and e-commerce have revolutionized the retail industry in recent years. E-commerce has drastically changed the way in which information about a customer’s journey to purchase is captured. Companies can now determine with relative ease what a specific customer is looking for, how they found the site, products they have purchased previously, and even past purchases they abandoned.

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

March 18, 2015 No Comments

with Jay Henderson, IBM CommerceIn this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers. Read More >>>

KnowBe4 Warns of Onslaught of New Ransomware Strains

March 13, 2015 No Comments

In a worrying trend, cybercriminals have launched another ransomware attack wave with several new malicious strains hitting both businesses and consumers alike. A new strain of CryptoWall has hit end users with phishing emails containing malicious .chm attachments (the extension used for help files) infecting networks with the most sophisticated ransomware to date. A newly discovered strain called CryptoFortress was discovered last week that has the look of TorrentLocker but is able to encrypt files over network shares even if they are not mapped to a drive letter.

How to lower your company`s IT development costs

March 10, 2015 No Comments

Doing business is one of the things that has changed the most with the advent of the modern digital age, along with human communication. Since the 1980s, our entrepreneurial processes have begun integrating computers and information and communications technology solutions in order to provide easier management of a number of business factors – financial analytics, inventory and storage listing, transport and logistics monitoring, ordering and providing post-sales services to the customers, just to name a few.

3 Essential Components for a Strong End User Security Strategy

March 5, 2015 No Comments

A single security breach is expensive, costing $3.5 million per incident. Breaches also generate bad publicity and tarnish a brand, leading some customers to take their business elsewhere. 

PCI DSS 3.0 Still Isn’t Enough

March 3, 2015 No Comments

By Ed Fox, Met’TelFollowing the data breaches of 2014 (think Home Depot, Target and Sony Entertainment Pictures), it’s clear that security should be top of mind for both businesses and consumers in 2015. Read More >>>

SophosLabs research uncovers new developments in PlugX APT malware

February 25, 2015 No Comments

The notorious PlugX APT group is continuing to evolve and launch campaigns, most recently a five-month-long campaign targeting organizations in India. PlugX now uses a new backdoor technique – hiding the payload in the Windows registry instead of writing it as a file on disk – according to a new technical paper from SophosLabs Principal Researcher Gabor Szappanos. Although not unique to PlugX, this backdoor approach is still uncommon and limited to a few relatively sophisticated malware families.

Are Hacktivists Bad For The Tech World?

February 24, 2015 No Comments

Socially conscious and active individuals have been around for a long time, possibly even longer than politics. However, as the world changes and new means of social activism are placed within their reach, subsequent generations adapt, taking the established methods of activism onto new forums and stages of public life, such as hashtag campaigns on Twitter, mobile apps and special interest groups on Facebook. Old-fashioned, traditional demonstrations, like rallies, protests, petitions, and marches, are still the most common and effective forms of activism, but a new branch – hacktivism – has been steadily gathering momentum and gaining relevance.

How to Maximize the Business Value of IT

February 23, 2015 No Comments

This has come true, and the time is not far when entire businesses are going to be run from the cloud. Businesses will also use the other arms of the Nexus of Forces — social, mobile and information — to drive employee productivity and deepen customer relationships in the next few years. But a day will come when this will not be enough to compete. Companies will need to use the Internet of Things (IoT) to build innovative business models with smart machines. By 2020, there will be over 30 billion devices wirelessly connected to the IoT.

Want Better Online Fraud Protection? Delve into the Subconscious

February 23, 2015 No Comments

2014 will surely go down in the history books as the “Year of the Data Breach.” Hundreds of millions of records, including PII (personally identifiable information), were stolen – the consequences of which may ripple out for years to come. These consequences include not only the credit and identity monitoring that affected individuals must undertake but the good faith of those individuals toward the companies that suffered breaches.

Making the most of your Hybrid Cloud Migration

February 20, 2015 No Comments

By Dave Eichorn, Zensar TechnologiesEnterprises understand the value of hybrid cloud models to achieve a variety of benefits, including lower startup costs, simplified management, and flexibility to scale storage on an as-needed basis. In fact, according to Gartner, nearly half of large enterprises will have hybrid cloud deployments by the end of 2017. Read More >>>

Billion Dollar Cyberheist Caused By Phish-prone Employees

February 16, 2015 No Comments

In what appears to be one of the largest and most highly sophisticated cyberheists ever, more than 100 financial institutions in 30 countries have been the victim of a cyberheist that lasted in some cases nearly 2 years. Most of the banks that were hit are in Russia, but also include banks in Japan, Europe, and the United States. The gang appears to be the first international cybermafia, a group of cybercriminals from Russia, Ukraine and other parts of Europe and China. Kaspersky could not release the names of the banks because of nondisclosure agreements.

5 Things to Look at Before You Buy Monitoring Software For Your Organization

February 12, 2015 No Comments

When trying to manage a large office, business owners must make sure to use monitoring software on all computers, tablets, laptops and electronic devices. The monitoring software your company invests in will lead the accountability of business, and help keep track of what happens within your office. Furthermore, it’s important to look for a few things in monitoring software before you buy, and understand how it’s going to work in your office.

Why Your File Transfer Solution Should Be As Secure As Your Valentine’s Day Delivery

February 12, 2015 No Comments

by Aaron Kelly, IpswitchLet’s face it, we don’t really pay a great deal of attention to delivery methods. As long as things arrive when they are supposed to and in good condition, we give the process very little thought. Read More >>>

Digital Risk Management: Why Cyber Security Measures Aren’t Enough

February 12, 2015 No Comments

Most companies of scale have cyber security measures in place – software solutions, policies and protocols, and regular assessments conducted by IT staff members around compliance and efficacy. With these measures in place, the executive management team might feel confident that their digital data is secure – until they’re blind-sided by crisis-inducing error or a data leakage event.

New Ransomware Strain Encrypts Files from Memory

February 10, 2015 No Comments

KnowBe4 CEO Stu Sjouwerman issued an alert to security professionals today about a newly discovered piece of ransomware dubbed ”Fessleak” by security firm Invincea. The ransomware is Russian and delivers its malicious code straight into system memory and does not drop any files on a disk. That means almost all antivirus software is unable to catch this. The infection vector is malicious ads on popular websites that the cybercriminals are able to display by bidding on the ad space through legit ad networks.

“The Offline Problem”: How to Solve the Biggest Hurdle Facing the Mobile Workforce

February 10, 2015 No Comments

by Richard Rabins, Alpha SoftwareDespite the opportunities that mobilizing the workforce offers, enterprises have deployed a surprisingly small number of apps due to the challenges inherent with mobile app development. Read More >>>

A Year in Review of the IT Security Industry and 2015 Predictions

February 10, 2015 No Comments

by Yo Delmar, MetricStreamNow that we are well on our way into 2015, we can look back on the year past to reflect on some of the challenges faced, and also on some of the lessons learned. Hindsight is always 20/20. Read More >>>

Architecting a New Approach for Continuous Advanced Threat Protection

January 28, 2015 No Comments

Watch this webcast and listne to Neail MacDonald and Jim Brennan discuss specific techniques that can help you prevent sophisticated attacks, detect stealthy and persistent threats already inside your organization, and how to best respond in the event of a security breach.

Five Tips for Strengthening the IT Department in 2015

January 28, 2015 No Comments

by David Kidd, Peak 10Data security continues to be a growing concern for all businesses – small and large – as part of a macro trend taking grip in 2015. While improving technologies are essential for protecting data, studies have shown that internal incidents continued to top the list of 2014 breaches. Read More >>>

Recent Insight into Analytics in the Cloud

January 26, 2015 No Comments

by John L. Myers, EMAAs we enter the middle of the second decade of the 21st century, many organizations are recognizing and utilizing cloud infrastructure as a way to implement their analytical and business intelligence requirements. Read More >>>

ADVERTISEMENT

AnDevCon

Gartner IT Operations Summit

UC Expo

Gartner Enterprise Architecture

Cloud Expo

Red Hat JBoss Busines Automate

ITBriefcase Comparison Report