Inside the Briefcase

Briefcase Highlights


Security industry must embrace modern PTT technologies

August 22, 2016 No Comments

The global security industry is growing at a rapid pace. More professional and coordinated operations across disciplines and geographical borders among criminals, is one of the drivers of the increased demand for advanced security services. This calls for more intense surveillance and security, according to the Europol “Serious and Organized Crime Assessment Report”. Gartner puts the global security market at $86bn, with annual growth of close to nine percent, citing “growing complexity of attacks”.

How Can Companies Prevent Cyber-terrorism

August 18, 2016 No Comments

According to statistics provided by the Federal Bureau of Investigation, a violent crime occurs every 25 seconds in the United States; meanwhile, the Daily Mail reports that a minor crime is committed in the United Kingdom every five seconds, however, according to a study from the research firm Javelin Strategy & Research, an identity is stolen online every two seconds. Cybercrime is a real crime – it provides more anonymity, it can be more difficult to prosecute and, this may surprise you, it is even more profitable than offline crimes.

Strategies for Defending Against Cyber Attacks on Critical Infrastructure

August 18, 2016 No Comments

Historically, the primary goal of cyber criminals has been to steal data that the criminals find valuable: personally identifiable information, intellectual property and so on. That digital information would then be converted, via fraud or other means, into real-world cash. Today, however, we are being confronted by attacks that directly affect the physical world – those launched against power grids, water systems and other crucial infrastructure.

IT Briefcase Exclusive Interview: Top 5 Must-have Security Features Every USB Drive Should Have

August 16, 2016 No Comments

with Mike McCandless, Apricorn In this interview, Apricorn VP Mike McCandless provides insight into the top must-have security features that every USB drive should contain. Read More >>>

5 Signs Your Website Has Been Hacked

August 15, 2016 No Comments

The estimated annual cost of cybercrime globally is about $100 billion. Dedicated hackers are developing their strategies so well that you may not even know your systems have been hacked until it’s too late. Here are 5 sure signs that your network has been compromised.

Why Are Cyber Thieves Always Steps Ahead of Enterprises?

August 15, 2016 No Comments

A sign of the times is that commuters on buses and trains are known to wrap their credit cards in aluminum foil so their personal information can’t be ‘skimmed’ by nearby cyber thieves. The practice recalls paranoid UFO believers who, in the 1950s, would wear hats made of aluminum foil so that aliens couldn’t read their brain waves. What’s mind boggling about the two stories is that the second was the stuff of nutty conspiracy theorists and the first is a grim reality of being a digital consumer today.

The Three Pillars of Effective Disaster Recovery

August 9, 2016 No Comments

Explore the three pillars that make up a strong and foundational disaster recovery solution: DRaaS, Managed Hosting, and the Network.

IT Briefcase Exclusive Interview: The Rise of Machine Learning Analytics

July 28, 2016 No Comments

with Jerry Melnick, SIOSIn this interview, SIOS Technology President and CEO Jerry Melnick speaks with IT Briefcase about optimizing infrastructure operations and application performance in complex VMware environments. Read More >>>

3 Productivity Killers That Wreak Havoc On Your Workflow

July 28, 2016 No Comments

Automation, cloud technology, and mobile business solutions are the latest tech tools in the corporate arsenal for streamlining operations, improving efficiency, and holding the line on skyrocketing costs. The proliferation of content management systems (CMS), customer relationship management (CRM), marketing automation, and integrated applications reflect the widespread belief that companies who embrace innovative business tools will gain a competitive advantage in the marketplace.

Best Tips from Remote DBA Experts to Help Keep Your Business Data Safe

July 28, 2016 No Comments

Keeping your business data safe is crucial to the success of your business. The last thing you want is for your competitors to gain insight into your product secrets or for sensitive client information to be leaked. Protecting your data is not only important to the success of your business but can also keep you from hefty fines and lawsuits. How can you keep your data safe? This post looks at a couple of things you need to use in order to keep your business data secure.

When it Comes to DNS, Redundancy is a Good Thing

July 25, 2016 No Comments

Business used to be simpler. It used to be possible—in fact, it was the norm—for enterprises to run their Domain Name Service (DNS) from just one data center. They placed their servers within its confines and went on their way without a care. After all, if their one data center went down, the DNS server would be useless.

Are Printers the New Endpoints of Security Vulnerability?

July 25, 2016 No Comments

As the internet and the international hacker community have evolved, network security has become essential for all companies. Yet, despite the fact that small and large corporations all over the world are going to great lengths to protect their infrastructure and data, networks are still being hacked on a regular basis.

How To Combat Security Cracks Created By Collaboration

July 21, 2016 No Comments

Cybercrime costs the global economy as much as $450 billion each year. And, the median cost of cybercrime has increased by nearly 200% in the last five years. Meanwhile, collaboration has become the cornerstone of successful organizations. But collaboration often comes with a risk. The number of cyberattacks will grow as employees increasingly use collaboration tools to maximize their company’s productivity.

IT Briefcase Exclusive Interview: Decoding Encryption with Sophos’ Dan Schiappa

July 21, 2016 No Comments

with Dan Schiappa, SophosIn this interview, Dan Schiappa, senior vice president and general manager of Enduser Security Group at Sophos, outlines some of the current IT security topics being addressed by businesses today. Read More >>>

SSH User Key Management for Security and Compliance

July 20, 2016 No Comments

Here’s an example of how SSH user keys can be misused and abused. In order to gain access to a development environment, developers go through a jump host, which allows them to access the servers they need. It oversees the commands they use and actions they take during their sessions.

The Truth Behind DNS-Based Attacks

July 19, 2016 No Comments

Fifty years ago, locking the front door was all we needed to feel safe and protected. We’ve come a long way since then. Nowadays, we live digital and connected lives that unfortunately expose us to new threats on a daily basis. No matter how much we try to protect our home from intruders, cyber criminals already live within our walls when we connect to the internet.

Former FBI Agent to Speak on Cybercrime at LockPath Ready Summit

July 12, 2016 No Comments

LockPath, a leader in governance, risk management and compliance (GRC) solutions, today announced that former FBI special agent Jeff Lanza will present the keynote lecture at the company’s second annual LockPath Ready Summit (LPRS), which is taking place October 4-5.

Best Practices for Enterprise Security

July 6, 2016 No Comments

Download this white paper and read how to manage risk while empowering business mobility by controlling access to applications and data across any location, network and device.

What Shark Week Can Teach Security Professionals About Encrypted Traffic Management (ETM)

July 5, 2016 No Comments

Just as you don’t know what’s lurking in the ocean water at the beach this summer, many organizations aren’t aware of the cyber threats hiding in their encrypted communications. As today’s threat landscape continues to evolve, SSL/TLS encryption is being widely adopted to protect enterprise communications while ensuring data privacy.

EMV Myths Debunked for the Retail Industry

June 15, 2016 No Comments

On October 1, 2015, a liability shift occurred as it relates to responsibility for paying for chargebacks for counterfeit cards used at a retail store. Between the retail stores, the bank that issued the credit card, and the payment processor, whoever is prepared the least to accept EMV payment cards will now be responsible to pay for the chargebacks. With this still being a relatively new practice it can still be confusing for some users. The folks at Counterpoint POS have put together an infographic below, debunking common myths regarding EMV credit card processing.

If Your Perimeter’s Not Secure, Neither is Your Data

June 2, 2016 No Comments

The last several years have shown us that, despite our best efforts to secure our networks, the bad guys are still getting in. Perimeter defenses continue to fail, and data continues to be stolen. What’s more, the perimeter isn’t as clear a notion as it once was. Consequently, IT security teams are beginning to change their thinking and focusing on data security. A key aspect of data security is encryption, but it must be implemented in a comprehensive manner. If not, data may not be secured in all locations, leading to a false notion of security that can end in theft.

Why IT Security Is a Top Priority for Every Business No Matter Its Size

May 26, 2016 No Comments

The days of being able to keep all of your files under lock and key are long gone. Everything is created and kept digitally now and, as our communications and records creation get modernized so, too, must a business’s security efforts. It isn’t enough to simply have your own internal server anymore, now that everything is online all the time.

Best Practices for Efficiently Preventing and Managing Incidents

May 26, 2016 No Comments

There are few things worse for an IT Operations executive than a mission-critical application outage. The operations team must address it immediately, and as the clock ticks, the bottom line shrinks. The pressure is on to reduce the mean time to repair (MTTR), but when the application is up again, it’s time to consider how this fire drill could have been avoided.

Forrester Report: Best Practices For Public Cloud Security

May 25, 2016 No Comments

Security is, justifiably, a top concern about public cloud environments. Application developers are migrating to the cloud for the agility and speed that the cloud can provide.

KnowBe4 CyberAlert: Double-Barrel Ransomware and DDos Attack in-one

May 24, 2016 No Comments

KnowBe4, issued an alert today on a malicious new trend in ransomware. Instead of “just” encrypting data files on a workstation (plus any network drive it can find) and locking the machine, a new variant of the Cerber ransomware is now adding a DDoS bot that can quietly blast spoofed network traffic at various IPs. This is the first time DDoS malware has been bundled within a ransomware infection. It means that while the victim is unable to access their endpoint, that same endpoint is being used to deny service to another victim. Two attacks for the price of one (and two ways cybercriminals can make money off victims).

How IT is Fighting the Good Fight for Security Preparedness

May 18, 2016 No Comments

Security breaches made big news in 2015. It seemed that every week brought with it a new high-profile data breach from a trusted major company—from retail giants to health insurers, and even government agencies. For many organizations, this was a wakeup call to ensure their security procedures fully protect their networks, critical infrastructure and sensitive data. But are organizations really more prepared today?

How To Do Enterprise Security like Bond…James Bond

May 17, 2016 No Comments

In the era of crippling state-sponsored hacks, cybercrime rings and data breaches, businesses are looking at all forms of preventative measures to keep attackers at bay. Even a modern-day James Bond would find it challenging to keep his data, and identity, a secret in the Information Age. And unlike in the famous films, the real-life ‘villains’ capable of stealing trade secrets, personal information and other forms of sensitive data are oftentimes anonymous and numerous. Reports estimated more than 317 million new pieces of malware were created within 2015 alone. Imagine what they can do today!

Maintaining Compliance for the Cloud Generation

May 12, 2016 No Comments

Learn the critical steps to prevent data leakage.

Innovation for the Cloud Generation

May 12, 2016 No Comments

This guide helps you identify and address the unexpected risks of the “cloud generation.”

The Ins and Outs of TLS Encryption

May 11, 2016 No Comments

Transport Layer Security (TLS) is a protocol that offers a high level of security to help authenticate and encrypt information between a client and server for both inbound and outbound email (and website) traffic. Encryption protocols such as TLS help create secure connections for communications that must transfer across unsecured networks. Although there are others, SSL and TLS are two of the most popular security protocols of their kind.


Gartner Catalyst Conference San Diego 2016

American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange