July 2, 2015
with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>
June 29, 2015
with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>
June 25, 2015
with Ryan Wilk, NuData SecurityIn this interview, Ryan Wilk, director of Customer Success for NuData Security, talks speaks with IT Briefcase about just how serious data breaches can be to both the consumer and the organization, the latest trend in fraud and the best way to stop fraud before it starts. Read More >>>
June 25, 2015
June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data including accounting paperwork, employee documents and sensitive customer information, should be a priority.
June 23, 2015
Just a handful of years after the Internet became available to the public, the need for encryption became apparent. Without a way to encrypt user information and websites, private data could be stolen by hackers. That would make online interactions unsafe, which would render online shopping and important Web-based communications (with government agencies, for instance) impossible.
June 8, 2015
Even if you can’t quite explain what Bitcoin is or how it operates, chances are that you have at least heard of it. This leading-edge cryptocurrency has been shaking up notions of what currency is and how value is transmitted since its founding in 2008. Bitcoin is intriguing to investors, technology watchers and even a few bankers due it is blockchain technology, a transaction database shared by all nodes participating in a system based on the Bitcoin protocol.
June 8, 2015
In today’s business technology-driven environment, it’s not a matter of “if,” but “when” business will encounter a breach or breakdown in the system. While this is especially true in areas like Tornado Alley, these concerns don’t just apply to tornado season. Natural disasters and extreme weather can unexpectedly hit throughout the year, so it is critical for organizations to approach business continuity and disaster recovery (BC/DR) as a proactive vs. reactive discipline.
June 5, 2015
So far this year, three large health insurers have disclosed data breaches that affected millions of customers. Social Security numbers, addresses, birthdays, even information about medical conditions, have been stolen for sale to the highest black market bidder. And while the cyber criminals are making money hand over fist, breached companies are losing it.
June 4, 2015
Aygun Suleymanova, Progress SoftwareWhether a developer is building mobile apps for a small- to medium-sized organization or a multinational enterprise, the apps themselves have to be enterprise-ready. Read More >>>
June 3, 2015
Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>
May 27, 2015
KnowBe4 CEO Stu Sjouwerman issued an alert to IT managers that there is a new strain of dangerous ransomware infecting employee’s workstations called Locker. The ransomware has infected workstations but sat there silently until midnight May 25, 2015 when it woke up. Locker then started to wreak havoc in a massive way. Since the strain reared its ugly head, Reddit has been swarmed with hundreds of 600 comments in the first 24 hours.
May 27, 2015
The National Institute of Standards and Technology (NIST) released new guidelines for managing risk in the supply chain. Aside from the legal ramifications of using unauthorized or counterfeit software, the focus of the guidelines centers around the potential risk introduced via third-party software, which includes commercial off-the-shelf (COTS), Government off-the-shelf (GOTS) and open source software (OSS). From a security practitioner’s viewpoint, each of these third-party software “products” introduces unknown risk to internal applications.
May 21, 2015
with George Avetisov, HYPR Corp.Here’s the problem, according to HYPR Corp., provider of a device-to-cloud biometric security platform: cyber criminals are focusing on mobile payments too, and organizations are repeatedly failing to secure data as it transitions to the cloud. Read More >>>
May 20, 2015
Data loss is one of the most serious concerns for both individuals and businesses. People who create, modify or enter any type of data into computer systems are aware of the effects of data loss on their work. Depending on the type of data loss that occurred, data recovery may be possible using various types of applications. There are many causes of data loss.
May 15, 2015
by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>
April 30, 2015
by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>
April 30, 2015
by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>
April 22, 2015
Are you just getting on the e-reading bandwagon after all this time? Perhaps you want to test it out instead of investing in an e-reader right away. Whether you have an iPad or Nook tablet there is something out there for everyone. Whatever the case may be, you can test how you like this new found hobby by using your iPhone on the go. And with the widely available reading apps for iOS, you just might fall in love with one of them.
April 22, 2015
by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>
April 20, 2015
by Cory Munchbach, BlueConicWhile A/B and multivariate testing has been known to improve the effectiveness of marketing campaigns, newer tools and methodologies that can be implemented today have evolved to become more effective and informative than their predecessors. Read More >>>
April 16, 2015
Facts surrounding spear phishing all point to employees as the most cited culprits and security awareness training as the most effective remedy. Yet all training programs are not equal.
April 16, 2015
with Vinit Tibrewal, ManageEngine“If you are an IT help desk technician, you’re a superhero!” You may have heard this many times from your help desk solution provider, if not from your customers and colleagues. Read More >>>
April 14, 2015
It seems we cannot get through a week without another report of a cyber-attack on a business enterprise. Take, for example, AT&T, Lowes, Target and Home Depot: four major brands with one thing in common. Each of these company’s revenues has recently been directly affected because of a data breach. In every case, the culprit was one of the company’s third parties: an HVAC supplier, a contract manufacturer, and a consultant who, because of lack of visibility and appropriate controls, ultimately cost the company millions of dollars.
April 13, 2015
As the EU finalizes the new EU Data Protection Act, which will likely become law across all EU member states by the end of 2015, I find myself once again turning my attention to data protection. As CEO of Calligo, the trusted cloud, I am eagerly awaiting to see how this new law will change how our data is handled by service providers and enterprises globally.
April 13, 2015
The CA Security Council (CASC), an advocacy group committed to the advancement of the security of websites and online transactions, today released its 2015 Consumer Trust Survey which found that validation matters. While consumers are confused about some aspects of security, they recognize and trust the security that SSL brings to e-commerce sites. Fifty-three percent of respondents identify the padlock as adding confidence in an e-commerce site, with 42 percent associating the green bar and organization name in the URL with greater safety.
April 3, 2015
IBM Security has identified an active campaign using a variant of Dyre malware that has successfully stolen more than $1 million from targeted enterprise organizations. The campaign, named “The Dyre Wolf” by IBM Security researchers, shows a brazen twist from the once-simple Dyre malware by adding sophisticated social engineering tactics likely to circumvent two-factor authentication. In recent incidents, organizations have lost between $500,000 and $1.5 million to attackers.
April 1, 2015
A 2015 survey of over 1,000 cyber security professionals confirms that security remains the biggest barrier to faster cloud adoption, with nine out of ten organizations expressing this concern. The survey explores a wide range of issues, including the specific driving forces and risk factors of cloud adoption, how organizations are currently using or planning to use the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security concerns in public, private and hybrid cloud environments.
March 31, 2015
by Mitch Black, MOBIRecently, there has been a great deal of debate in the world of mobile devices and how they function in the enterprise. There’s BYOD (Bring Your Own Device) vs. COPE (Corporate Owned, Personally Enabled), and now even CYOD (Choose Your Own Device). Read More >>>
March 18, 2015
It’s no secret that the Internet and e-commerce have revolutionized the retail industry in recent years. E-commerce has drastically changed the way in which information about a customer’s journey to purchase is captured. Companies can now determine with relative ease what a specific customer is looking for, how they found the site, products they have purchased previously, and even past purchases they abandoned.
March 18, 2015
with Jay Henderson, IBM CommerceIn this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers. Read More >>>