Inside the Briefcase

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

with Jay Henderson, IBM Commerce
In this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers.

Briefcase Highlights


IT Briefcase Exclusive Interview with Learning@Cisco: New Training Needed to Manage the Internet of Everything

July 2, 2015 No Comments

with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>

Your Mobile Wallet Isn’t Safe

June 29, 2015 No Comments

with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>

IT Briefcase Exclusive Interview with NuData Security: Detecting Identity Theft to Prevent Online Fraud

June 25, 2015 No Comments

with Ryan Wilk, NuData SecurityIn this interview, Ryan Wilk, director of Customer Success for NuData Security, talks speaks with IT Briefcase about just how serious data breaches can be to both the consumer and the organization, the latest trend in fraud and the best way to stop fraud before it starts. Read More >>>

Hurricane Season: Electronic Protection Tips

June 25, 2015 No Comments

June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data including accounting paperwork, employee documents and sensitive customer information, should be a priority.

Overcoming the Double Vulnerability of Open Source Software and Poor Secure Shell Key Management

June 23, 2015 No Comments

Just a handful of years after the Internet became available to the public, the need for encryption became apparent. Without a way to encrypt user information and websites, private data could be stolen by hackers. That would make online interactions unsafe, which would render online shopping and important Web-based communications (with government agencies, for instance) impossible.

Bitcoin Security Receives a Much-Needed Upgrade

June 8, 2015 No Comments

Even if you can’t quite explain what Bitcoin is or how it operates, chances are that you have at least heard of it. This leading-edge cryptocurrency has been shaking up notions of what currency is and how value is transmitted since its founding in 2008. Bitcoin is intriguing to investors, technology watchers and even a few bankers due it is blockchain technology, a transaction database shared by all nodes participating in a system based on the Bitcoin protocol.

Maintaining business continuity during storm season and beyond

June 8, 2015 No Comments

In today’s business technology-driven environment, it’s not a matter of “if,” but “when” business will encounter a breach or breakdown in the system. While this is especially true in areas like Tornado Alley, these concerns don’t just apply to tornado season. Natural disasters and extreme weather can unexpectedly hit throughout the year, so it is critical for organizations to approach business continuity and disaster recovery (BC/DR) as a proactive vs. reactive discipline.

Streamlining the Compliance Process with Automated Monitoring

June 5, 2015 No Comments

So far this year, three large health insurers have disclosed data breaches that affected millions of customers. Social Security numbers, addresses, birthdays, even information about medical conditions, have been stolen for sale to the highest black market bidder. And while the cyber criminals are making money hand over fist, breached companies are losing it.

Doing Versus Planning: The New Way to Build Enterprise Apps

June 4, 2015 No Comments

Aygun Suleymanova, Progress SoftwareWhether a developer is building mobile apps for a small- to medium-sized organization or a multinational enterprise, the apps themselves have to be enterprise-ready. Read More >>>

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

June 3, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>

KnowBe4 Alert: New Strain Of Sleeper Ransomware

May 27, 2015 No Comments

KnowBe4 CEO Stu Sjouwerman issued an alert to IT managers that there is a new strain of dangerous ransomware infecting employee’s workstations called Locker. The ransomware has infected workstations but sat there silently until midnight May 25, 2015 when it woke up. Locker then started to wreak havoc in a massive way. Since the strain reared its ugly head, Reddit has been swarmed with hundreds of 600 comments in the first 24 hours.

NIST Releases New Guidelines for Supply Chain Security

May 27, 2015 No Comments

The National Institute of Standards and Technology (NIST) released new guidelines for managing risk in the supply chain. Aside from the legal ramifications of using unauthorized or counterfeit software, the focus of the guidelines centers around the potential risk introduced via third-party software, which includes commercial off-the-shelf (COTS), Government off-the-shelf (GOTS) and open source software (OSS). From a security practitioner’s viewpoint, each of these third-party software “products” introduces unknown risk to internal applications.

IT Briefcase Exclusive Interview with HYPR Corp: Fighting Online Fraud

May 21, 2015 No Comments

with George Avetisov, HYPR Corp.Here’s the problem, according to HYPR Corp., provider of a device-to-cloud biometric security platform: cyber criminals are focusing on mobile payments too, and organizations are repeatedly failing to secure data as it transitions to the cloud. Read More >>>

How serious is Data Loss?

May 20, 2015 No Comments

Data loss is one of the most serious concerns for both individuals and businesses. People who create, modify or enter any type of data into computer systems are aware of the effects of data loss on their work. Depending on the type of data loss that occurred, data recovery may be possible using various types of applications. There are many causes of data loss.

Killing Misconception: Five Steps to BPM Success

May 15, 2015 No Comments

by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>

Consumers Need an Education in Online Shopping Security 101

April 30, 2015 No Comments

by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>

Eight Realities That Demand Multi-Factor Authentication

April 30, 2015 No Comments

by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>

5 iPhone Reading Apps You Won’t Want To Miss

April 22, 2015 No Comments

Are you just getting on the e-reading bandwagon after all this time? Perhaps you want to test it out instead of investing in an e-reader right away. Whether you have an iPad or Nook tablet there is something out there for everyone. Whatever the case may be, you can test how you like this new found hobby by using your iPhone on the go. And with the widely available reading apps for iOS, you just might fall in love with one of them.

7 Steps to Securely Deploy Cloud Apps

April 22, 2015 No Comments

by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>

Why Marketers Need to Put A/B Testing by the Wayside Content

April 20, 2015 No Comments

by Cory Munchbach, BlueConicWhile A/B and multivariate testing has been known to improve the effectiveness of marketing campaigns, newer tools and methodologies that can be implemented today have evolved to become more effective and informative than their predecessors. Read More >>>

If You Think Security Awareness Education is Expensive, Try Ignorance

April 16, 2015 No Comments

Facts surrounding spear phishing all point to employees as the most cited culprits and security awareness training as the most effective remedy. Yet all training programs are not equal.

7 Service Desk Habits of The Avengers

April 16, 2015 No Comments

with Vinit Tibrewal, ManageEngine“If you are an IT help desk technician, you’re a superhero!” You may have heard this many times from your help desk solution provider, if not from your customers and colleagues. Read More >>>

Data Breaches and Third Parties: 5 Questions to Ask Now

April 14, 2015 No Comments

It seems we cannot get through a week without another report of a cyber-attack on a business enterprise. Take, for example, AT&T, Lowes, Target and Home Depot: four major brands with one thing in common. Each of these company’s revenues has recently been directly affected because of a data breach. In every case, the culprit was one of the company’s third parties: an HVAC supplier, a contract manufacturer, and a consultant who, because of lack of visibility and appropriate controls, ultimately cost the company millions of dollars.

Data Protection– What’s Next?

April 13, 2015 No Comments

As the EU finalizes the new EU Data Protection Act, which will likely become law across all EU member states by the end of 2015, I find myself once again turning my attention to data protection. As CEO of Calligo, the trusted cloud, I am eagerly awaiting to see how this new law will change how our data is handled by service providers and enterprises globally.

CA Security Council Report: Consumers Don’t Know Much About Security

April 13, 2015 No Comments

The CA Security Council (CASC), an advocacy group committed to the advancement of the security of websites and online transactions, today released its 2015 Consumer Trust Survey which found that validation matters. While consumers are confused about some aspects of security, they recognize and trust the security that SSL brings to e-commerce sites. Fifty-three percent of respondents identify the padlock as adding confidence in an e-commerce site, with 42 percent associating the green bar and organization name in the URL with greater safety.

The Dyre Wolf Campaign: Stealing Millions and Hungry for More

April 3, 2015 No Comments

IBM Security has identified an active campaign using a variant of Dyre malware that has successfully stolen more than $1 million from targeted enterprise organizations. The campaign, named “The Dyre Wolf” by IBM Security researchers, shows a brazen twist from the once-simple Dyre malware by adding sophisticated social engineering tactics likely to circumvent two-factor authentication. In recent incidents, organizations have lost between $500,000 and $1.5 million to attackers.

Cloud Security Survey both Confirms and Challenges Common Beliefs

April 1, 2015 No Comments

A 2015 survey of over 1,000 cyber security professionals confirms that security remains the biggest barrier to faster cloud adoption, with nine out of ten organizations expressing this concern. The survey explores a wide range of issues, including the specific driving forces and risk factors of cloud adoption, how organizations are currently using or planning to use the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security concerns in public, private and hybrid cloud environments.

COPE vs. BYOD vs. CYOD – How Should an Enterprise Choose?

March 31, 2015 No Comments

by Mitch Black, MOBIRecently, there has been a great deal of debate in the world of mobile devices and how they function in the enterprise. There’s BYOD (Bring Your Own Device) vs. COPE (Corporate Owned, Personally Enabled), and now even CYOD (Choose Your Own Device). Read More >>>

Retail: It’s all about gaining consumer confidence

March 18, 2015 No Comments

It’s no secret that the Internet and e-commerce have revolutionized the retail industry in recent years. E-commerce has drastically changed the way in which information about a customer’s journey to purchase is captured. Companies can now determine with relative ease what a specific customer is looking for, how they found the site, products they have purchased previously, and even past purchases they abandoned.

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

March 18, 2015 No Comments

with Jay Henderson, IBM CommerceIn this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers. Read More >>>


TDWI Boston

Gartner BPM Summit

American Customer Festival



Red Hat JBoss Busines Automate

ITBriefcase Comparison Report