Inside the Briefcase


IT Briefcase Exclusive Interview: Getting the Most Out of Open Source While Managing License Compliance, Risk, and Security

IT Briefcase Exclusive Interview: Getting the Most Out of Open Source While Managing License Compliance, Risk, and Security

with Kendra Morton, Flexera
In this interview, Kendra Morton, product marking manager at Flexera, discusses Software Composition Analysis (SCA) trends including leading Flexera’s annual State of Open Source License Compliance report. Read More >>>

Why DEM Matters More Than Ever in Financial Services

Why DEM Matters More Than Ever in Financial Services

Remember waiting in line at the bank? Banking customers are doing a lot less of that in the digital era, which has revolutionized the way financial services function. Live tellers and bankers have been replaced by online transactions and...





Briefcase Highlights


SECURITY

WipeDrive and the IT Asset Lifecycle

April 2, 2020 No Comments

The assets of your company or organization are constantly being cycled through the stages of active use, upgrade, or disposal. When we discuss IT assets including servers, laptops, and mobile devices, managing the security of the data these assets contain often requires disk wipe software like WipeDrive to allow secure disposal at end of life.

How compliance teams are using AI technology to get ahead

March 25, 2020 No Comments

Compliance teams in businesses of all shapes and sizes across the globe require a number of different tactics to ensure that they are meeting legal or organizational policies set in place, but there is a newcomer in the form of AI that is proving to shake up the way compliance teams conduct business. Artificial intelligence is starting to prove yet again that it might be the solution for businesses.

BEST CYBERSECURITY PRACTICES: DATA PRIVACY

March 24, 2020 No Comments

In today’s digital age, data collection and sharing have become seamless, fast and inexpensive. Each day, people share increasing amounts of their personal information online, oftentimes unknowingly. This personal data becomes an important asset to numerous companies and government institutions all over the world. Giant organisations such as Google, Amazon, WhatsApp and Facebook have built empires based on people’s data.

White Label Ad Platform vs Building Your Own

March 20, 2020 No Comments

It’s never the norm for us, so we’re coming clear right away: we won’t be offering a decision-making model on white label vs DIY ad platform and instead we’ll try to do our best to nudge you in the right direction of the highly effective world of ready-made white label solutions.

2020 Security Foresight

March 17, 2020 No Comments

There are a lot of discussions and even more headlines about the lack of network security. Tales range from high-profile network breaches to private data from a number of organizations being accessed by unauthorized parties. IT has long protected the network and the data on it, but now, these security breaches can come from unexpected places, including devices such as wireless presentation systems.

5 Reasons Why You Might Like Being A Cybersecurity Analyst

March 5, 2020 No Comments

Do you wonder what life would be like as a cybersecurity analyst? Or maybe you want to know if cybersecurity careers are something that you would be good at? Well, if so, you’ve come to the right place. In this article, we are going to talk about five reasons why you might like being a cybersecurity analyst.

IT Briefcase Exclusive Interview: Getting the Most Out of Open Source While Managing License Compliance, Risk, and Security

March 4, 2020 No Comments

with Kendra Morton, FlexeraIn this interview, Kendra Morton, product marking manager at Flexera, discusses Software Composition Analysis (SCA) trends including leading Flexera’s annual State of Open Source License Compliance report. Read More >>>

Why DEM Matters More Than Ever in Financial Services

February 28, 2020 No Comments

Remember waiting in line at the bank? Banking customers are doing a lot less of that in the digital era, which has revolutionized the way financial services function. Live tellers and bankers have been replaced by online transactions and digital currency. Insurance, mortgages, investments, and more are also mainly handled online. Waiting is no longer an option for today’s financial services customers, who now expect instant and accurate transactions conducted on a website or mobile app. This has given rise to a new technological discipline called digital experience monitoring (DEM).

Is using crypto safer when carrying out online money transfers?

January 23, 2020 No Comments

Anyone with even a passing interest in tech or IT will be aware of the burgeoning cryptocurrency sector. Bitcoin is still the major player here and the coin that not only grabs headlines but also gives an indicator of the overall health that this sector may show. The great news for investors since the early 2010s is that the price of bitcoin has gone up overall until the present day.

Erase Your Data Securely by Using BitRaser File Eraser for Windows—Software Review

January 14, 2020 No Comments

In today’s world, data is everything. And, disclosure of critical, sensitive data like personal photos, videos can result in monetary, reputation, or business loss to an individual or an organization. Sadly, many computer users are unaware of the fact that Windows doesn’t remove the deleted data permanently. Even a quick formatted PC or external storage drive is not safe to dispose of, resell, or repurpose.

How Will The Internet of Things Impact Cyber Security?

January 10, 2020 No Comments

Each of us lives within the realm of the Internet of Things. Smartwatches track our steps as we walk to and fro in the office. We can order refills of paper towels or toothpaste by simply speaking to our smart speakers. As wonderful as all of this can be, it also means our data is being collected 24/7. Vulnerabilities in these smart devices can leave the proverbial backdoor open to our data. Both businesses and individuals are left exposed to a potential cyber-attack. But how does the Internet of Things really impact cybersecurity?

What Is Firmware in Computer Systems?

December 17, 2019 No Comments

Most people have heard of software or hardware, but if you are simply an average tech user who knows how to navigate a smartphone and not much else, you are likely unfamiliar with the word “firmware.” Yet firmware is essential to the operation of any computerized system, so it is important to understand what it means as well as how you can use it to your advantage.

How to Make Sure You Don’t Fall Victim to the Newest Malware

December 17, 2019 No Comments

Malware is evolving every day. As technology becomes more advanced, hackers and scammers follow those advancements to try and create the most cunning malware options. If you want to avoid ending up with malware on your devices, your best move will always be to stay out in front of it. But how can you do that, especially if you’re not already extremely tech-savvy? It’s simple: you can take these tips to make sure you stay up-to-date on new malware.

What is DNSSEC?

December 16, 2019 No Comments

Internet security is, to put it lightly, a really big deal. Sometimes the problem with internet security isn’t clever hackers finding ways around complex systems—sometimes the systems are just innately vulnerable. Why and where this is the case is best understood by recognizing that, when the internet was being formed in the 1980’s, it was new, its potential was wholly unknown, and it was mostly only of interest to governments, militaries, and a small few technology enthusiasts and scientists at technical universities.

TOP-5 Tools for Security: What Anonymous Browser to Choose?

December 3, 2019 No Comments

Is it a surprise for you, that not all browsers are safe? The truth is that mainstream programs, like Chrome, Safari, Opera, IE, track what you do online. What pages you visit, what you search on the Internet, what software you download. Moreover, the billing info you mention every time you do shopping is kept on the server and can be hacked effortlessly. The private mode does not make browsing confidential.

Keeping WordPress and Your Data Safe and Secure

December 3, 2019 No Comments

WordPress is a massively popular open source platform and it is estimated that either hundreds of thousands of them do get hacked each year or leave their self vulnerable to get hacked each year. It’s not that WordPress is a poor platform, far from it, it just appears that people don’t take as much care of them as they should and so robots crawling the web can easily find ways in.

IT Briefcase Exclusive Interview: How DevOps Teams Can Leverage Policy-as-Code to Scale Kubernetes

November 19, 2019 No Comments

Kubernetes and containerization make application delivery much faster. But DevOps professionals hit a brick wall when they have to prove compliance to non-coders. In this QA, Styra security strategist Chris Webber talks to us from KubeCon in San Diego on how to bridge the communication gap between DevOps and Security/Compliance professionals.

How Machine Learning and AI is Transforming the Future of Healthcare

November 14, 2019 No Comments

Artificial intelligence has been vexing us all for years. And it only continues to get better and better as time goes on. Sure, you will have some people who believe AI is a bad thing, or that it knows too much. However, whether we like it or not, AI is here to stay. Imagine a machine learning technology that can bring with it the knowledge of THOUSANDS of doctors-and bringing valuable insight to a single physician who can then make a sound treatment decision.

From Talent Loss to Data Breach: The Risks of Outdated Technology

November 13, 2019 No Comments

An impressive 91% of knowledge workers say they’re proud of the work they do and care about bigger picture objectives, according to Workfront’s 6th annual State of Work report, which surveyed 3,750 knowledge workers in the US, UK, the Netherlands, and Germany. But almost half of those surveyed struggle to be productive because of outdated workplace technology.

Addressing Cloud Deficiencies – Can Your Cloud Stay Afloat?

November 12, 2019 No Comments

It’s no surprise that cloud adoption continues to be on the rise with some studies showing that 83% of enterprise workloads will be in the cloud by 2020 and that 94% of enterprises already use some type of cloud service. Moreover, since the cloud offers numerous benefits including reducing IT costs, providing quick access to business applications and forms, and supporting work groups with on-demand and easy access to important data, it’s no wonder that numerous industries, from retail, to finance, to banking and even healthcare are all taking the cloud by storm.

Data Privacy and Cybersecurity: What You Need to Know

October 22, 2019 No Comments

Governments around the world have responded to cyberattacks by enacting regulations to govern data protection and privacy for their citizens. The EU, for example, passed the General Data Protection Regulation (GDPR) in 2016, giving citizens throughout the EU control over their personal data and simplifying the regulatory environment for international companies doing business there. Similarly, Brazil will enact its new General Data Protection Law in mid-2020.

Online Payment Security – How to Maintain It

October 11, 2019 No Comments

People have been exchanging goods and services for money ever since the dawn of civilization. The history of money is rather interesting and eventful. Initially people used to exchange goods for goods, then about 700 BC the Chinese introduced paper money, also known as banknotes and in the 20th century several new innovative ways to make payments were introduced such as credit cards and online payments.

IT Briefcase Exclusive Intervew: Software Usage Management and Insights – How Product Managers Can Avoid Flying Blind

October 9, 2019 No Comments

As director of global marketing and enablement at Flexera, Nicole Segerer keeps her finger on software monetization trends. In this exclusive interview, she shares insight about how software suppliers are using usage management and insights to create better, more profitable software.

Using Risk Management to Keep Your Business Secure Online

September 26, 2019 No Comments

By the end of 2018, cyber-attacks had increased by 59%, making the internet a little bit riskier for businesses. Even worse, cybercriminals have been shifting to using subtle attacks against businesses. While those that have a strong cyber-security program can spot these attacks from miles away, unprepared businesses are in for a ride.

How Hackers “Slurp” Up Your Cloud Data

September 19, 2019 No Comments

The cloud can be a huge asset for most businesses. By leveraging the capabilities and services provided by cloud service providers, organizations can offload many of the problems and responsibilities of maintaining their own infrastructure to a third party and take advantage of the cost savings and scalability available in the cloud.

IT Briefcase Exclusive Interview: How VMware Cloud on AWS Can Improve Data Protection and Recovery

September 19, 2019 No Comments

with Matthew Wallace, FactionIn this interview, Matthew Wallace, CTO of Faction, sees VMware Cloud on AWS growing in 2019. Here, he shares insights about trends in VMware, best use cases, advantages, and how to avoid delays and complications in disaster recovery.Read More >>>

IT Briefcase Exclusive Interview: Machine Learning: The Next Frontier in Data Protection

September 18, 2019 No Comments

Deploying machine learning as part an organization’s data protection strategy can provide the critical assistance users need to apply the proper safeguards to data they’ve created without adding friction to their day-to-day activities. Machine learning can go one step further and remove the user from the equation while increasing confidence in your organization’s ability to identify, contextualize and classify its unique data. In this discussion with Mark Cassetta, senior vice president of strategy for TITUS, we learn why machine learning can provide greater confidence in identifying and protecting critical data.

Types Of Security For Your iPhone: A Guide

September 18, 2019 No Comments

Whether you’ve invested in a new iPhone for business or personal use, keeping it running efficiently comes down to how secure you keep it. Malware affects smartphones just as it does personal computers, and so it’s paramount that we keep our smartphones safe some cybercrime. This is particularly pertinent if you use your personal phone as your business phone. Bring your own device schemes (BYOD) do sometimes leave, companies open to the threat of potential cybercrime.

IT Briefcase Exclusive Interview: Changing the World of Brand Tracking

September 16, 2019 No Comments

In this interview, we talk with Rytis Jakubauskas, General Manager at Latana, about the changing world of brand tracking. Rytis discusses the need for a more innovative and reliable brand tracker in the market – and why the Latana team decided to build just that.

Webinar: How to prepare your data pipeline for machine learning and AI

September 12, 2019 No Comments

Join Amazon Web Services (AWS) and global intelligence provider, IDC, for a training-based session on transforming your data to power machine learning and AI projects. Learn how to prepare data pipelines that automate your machine learning and AI workflows, use AWS Data Pipeline to automate data movement and transformation, unlock insights that fuel your business, and explore software solutions in AWS Marketplace that make your data analytics-ready.

ADVERTISEMENT

Gartner