Inside the Briefcase

Briefcase Highlights


IT Briefcase Exclusive Interview: The Rise of Machine Learning Analytics

July 28, 2016 No Comments

with Jerry Melnick, SIOSIn this interview, SIOS Technology President and CEO Jerry Melnick speaks with IT Briefcase about optimizing infrastructure operations and application performance in complex VMware environments. Read More >>>

3 Productivity Killers That Wreak Havoc On Your Workflow

July 28, 2016 No Comments

Automation, cloud technology, and mobile business solutions are the latest tech tools in the corporate arsenal for streamlining operations, improving efficiency, and holding the line on skyrocketing costs. The proliferation of content management systems (CMS), customer relationship management (CRM), marketing automation, and integrated applications reflect the widespread belief that companies who embrace innovative business tools will gain a competitive advantage in the marketplace.

Best Tips from Remote DBA Experts to Help Keep Your Business Data Safe

July 28, 2016 No Comments

Keeping your business data safe is crucial to the success of your business. The last thing you want is for your competitors to gain insight into your product secrets or for sensitive client information to be leaked. Protecting your data is not only important to the success of your business but can also keep you from hefty fines and lawsuits. How can you keep your data safe? This post looks at a couple of things you need to use in order to keep your business data secure.

When it Comes to DNS, Redundancy is a Good Thing

July 25, 2016 No Comments

Business used to be simpler. It used to be possible—in fact, it was the norm—for enterprises to run their Domain Name Service (DNS) from just one data center. They placed their servers within its confines and went on their way without a care. After all, if their one data center went down, the DNS server would be useless.

Are Printers the New Endpoints of Security Vulnerability?

July 25, 2016 No Comments

As the internet and the international hacker community have evolved, network security has become essential for all companies. Yet, despite the fact that small and large corporations all over the world are going to great lengths to protect their infrastructure and data, networks are still being hacked on a regular basis.

How To Combat Security Cracks Created By Collaboration

July 21, 2016 No Comments

Cybercrime costs the global economy as much as $450 billion each year. And, the median cost of cybercrime has increased by nearly 200% in the last five years. Meanwhile, collaboration has become the cornerstone of successful organizations. But collaboration often comes with a risk. The number of cyberattacks will grow as employees increasingly use collaboration tools to maximize their company’s productivity.

IT Briefcase Exclusive Interview: Decoding Encryption with Sophos’ Dan Schiappa

July 21, 2016 No Comments

with Dan Schiappa, SophosIn this interview, Dan Schiappa, senior vice president and general manager of Enduser Security Group at Sophos, outlines some of the current IT security topics being addressed by businesses today. Read More >>>

SSH User Key Management for Security and Compliance

July 20, 2016 No Comments

Here’s an example of how SSH user keys can be misused and abused. In order to gain access to a development environment, developers go through a jump host, which allows them to access the servers they need. It oversees the commands they use and actions they take during their sessions.

The Truth Behind DNS-Based Attacks

July 19, 2016 No Comments

Fifty years ago, locking the front door was all we needed to feel safe and protected. We’ve come a long way since then. Nowadays, we live digital and connected lives that unfortunately expose us to new threats on a daily basis. No matter how much we try to protect our home from intruders, cyber criminals already live within our walls when we connect to the internet.

Former FBI Agent to Speak on Cybercrime at LockPath Ready Summit

July 12, 2016 No Comments

LockPath, a leader in governance, risk management and compliance (GRC) solutions, today announced that former FBI special agent Jeff Lanza will present the keynote lecture at the company’s second annual LockPath Ready Summit (LPRS), which is taking place October 4-5.

Best Practices for Enterprise Security

July 6, 2016 No Comments

Download this white paper and read how to manage risk while empowering business mobility by controlling access to applications and data across any location, network and device.

What Shark Week Can Teach Security Professionals About Encrypted Traffic Management (ETM)

July 5, 2016 No Comments

Just as you don’t know what’s lurking in the ocean water at the beach this summer, many organizations aren’t aware of the cyber threats hiding in their encrypted communications. As today’s threat landscape continues to evolve, SSL/TLS encryption is being widely adopted to protect enterprise communications while ensuring data privacy.

EMV Myths Debunked for the Retail Industry

June 15, 2016 No Comments

On October 1, 2015, a liability shift occurred as it relates to responsibility for paying for chargebacks for counterfeit cards used at a retail store. Between the retail stores, the bank that issued the credit card, and the payment processor, whoever is prepared the least to accept EMV payment cards will now be responsible to pay for the chargebacks. With this still being a relatively new practice it can still be confusing for some users. The folks at Counterpoint POS have put together an infographic below, debunking common myths regarding EMV credit card processing.

If Your Perimeter’s Not Secure, Neither is Your Data

June 2, 2016 No Comments

The last several years have shown us that, despite our best efforts to secure our networks, the bad guys are still getting in. Perimeter defenses continue to fail, and data continues to be stolen. What’s more, the perimeter isn’t as clear a notion as it once was. Consequently, IT security teams are beginning to change their thinking and focusing on data security. A key aspect of data security is encryption, but it must be implemented in a comprehensive manner. If not, data may not be secured in all locations, leading to a false notion of security that can end in theft.

Why IT Security Is a Top Priority for Every Business No Matter Its Size

May 26, 2016 No Comments

The days of being able to keep all of your files under lock and key are long gone. Everything is created and kept digitally now and, as our communications and records creation get modernized so, too, must a business’s security efforts. It isn’t enough to simply have your own internal server anymore, now that everything is online all the time.

Best Practices for Efficiently Preventing and Managing Incidents

May 26, 2016 No Comments

There are few things worse for an IT Operations executive than a mission-critical application outage. The operations team must address it immediately, and as the clock ticks, the bottom line shrinks. The pressure is on to reduce the mean time to repair (MTTR), but when the application is up again, it’s time to consider how this fire drill could have been avoided.

Forrester Report: Best Practices For Public Cloud Security

May 25, 2016 No Comments

Security is, justifiably, a top concern about public cloud environments. Application developers are migrating to the cloud for the agility and speed that the cloud can provide.

KnowBe4 CyberAlert: Double-Barrel Ransomware and DDos Attack in-one

May 24, 2016 No Comments

KnowBe4, issued an alert today on a malicious new trend in ransomware. Instead of “just” encrypting data files on a workstation (plus any network drive it can find) and locking the machine, a new variant of the Cerber ransomware is now adding a DDoS bot that can quietly blast spoofed network traffic at various IPs. This is the first time DDoS malware has been bundled within a ransomware infection. It means that while the victim is unable to access their endpoint, that same endpoint is being used to deny service to another victim. Two attacks for the price of one (and two ways cybercriminals can make money off victims).

How IT is Fighting the Good Fight for Security Preparedness

May 18, 2016 No Comments

Security breaches made big news in 2015. It seemed that every week brought with it a new high-profile data breach from a trusted major company—from retail giants to health insurers, and even government agencies. For many organizations, this was a wakeup call to ensure their security procedures fully protect their networks, critical infrastructure and sensitive data. But are organizations really more prepared today?

How To Do Enterprise Security like Bond…James Bond

May 17, 2016 No Comments

In the era of crippling state-sponsored hacks, cybercrime rings and data breaches, businesses are looking at all forms of preventative measures to keep attackers at bay. Even a modern-day James Bond would find it challenging to keep his data, and identity, a secret in the Information Age. And unlike in the famous films, the real-life ‘villains’ capable of stealing trade secrets, personal information and other forms of sensitive data are oftentimes anonymous and numerous. Reports estimated more than 317 million new pieces of malware were created within 2015 alone. Imagine what they can do today!

Maintaining Compliance for the Cloud Generation

May 12, 2016 No Comments

Learn the critical steps to prevent data leakage.

Innovation for the Cloud Generation

May 12, 2016 No Comments

This guide helps you identify and address the unexpected risks of the “cloud generation.”

The Ins and Outs of TLS Encryption

May 11, 2016 No Comments

Transport Layer Security (TLS) is a protocol that offers a high level of security to help authenticate and encrypt information between a client and server for both inbound and outbound email (and website) traffic. Encryption protocols such as TLS help create secure connections for communications that must transfer across unsecured networks. Although there are others, SSL and TLS are two of the most popular security protocols of their kind.

Webcast: The Phantom Identity Menace

May 10, 2016 No Comments

Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data. How can you strike back and stop breaches that attack your users far, far away?

Webcast: They have all our passwords. It’s time for MFA everywhere.

May 10, 2016 No Comments

Let’s face it. With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. We know that eliminating passwords is the right thing to do, but that takes time, and the bad guys are already inside our networks.

Strengthening App Security with Multi-factor Authentication

May 10, 2016 No Comments

Passwords are the weakest link in your security. Learn how to strengthen security with adaptive multi-factor authentication across enterprise identities and resources — without frustrating users.

Who Moved My Secure Perimeter

May 10, 2016 No Comments

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. Read this white paper to learn more.

IT Briefcase Exclusive Interview: Steps for Successful VDI Implementation

May 6, 2016 No Comments

with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>

The Digital Workforce – INFOGRAPHIC

May 5, 2016 No Comments

Security starts with people…and every person is unique and complex. And people are constantly moving! How do you keep track of the new agile workforce?

Cloud Security Report

May 3, 2016 No Comments

In this report, you will gain a greater understanding of how industry and online presence drive your threat profile, how the Cyber Kill Chain construct drives understanding, and get recommendations on how to improve your security posture.


Gartner Catalyst Conference San Diego 2016

American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange