Inside the Briefcase

Briefcase Highlights


Risk and Reward: Docker Security Threats You Need to Know About

August 13, 2018 No Comments

Docker is here to stay. It’s only natural that the computer science industry leans toward that which is more efficient and more universal. If you were handed keys to a new sports car, you’re apt to leave your old car, 9 times out of 10. But with new things come new risks. In the case of a new high-end speed devil, one risk lies in having to adjust to the new car — how it handles, its mileage, how easy it is to scrape against curbs because of the low ride height. Not only that, but you’re bound to catch attention, and sometimes, it’s the attention of unscrupulous elements.

TOP 5 BPM trends essential for your Digital Transformation in 2018

August 6, 2018 No Comments

The BPM industry continues to grow, responding to the strong need for more robust solutions to help organizations support process design, execution, optimization, as well as digital transformation initiatives. Download this whitepaper and discover what BPM tools will be critical for your Digital Transformation initiatives!

Mastering digital operational excellence with an intelligent BPM

August 6, 2018 No Comments

Mastering digital operational excellence is critically fundamental for forward-thinking companies in the age of the customer. It drives operational agility enabling organizations to accelerate their time-to-strategy execution, making the staff more responsive and build leaner processes. Download this whitepaper to learn what key aspects organizations need to focus on to gain operational excellence.

IT Briefcase Exclusive Interview: Only One-Quarter Who Pay Ransomware Fees Get Their Data Back

August 1, 2018 No Comments

with Linus Chang, BackupAssistIn this discussion with Linus Chang, Co-Founder and CEO of BackupAssist, we learn why the strategy of planning to pay the ransom in the wake of a ransomware attack is misguided. Read More >>>

The Rocky Road to Healthcare IoT Security

July 24, 2018 No Comments

In today’s healthcare world, the Internet of Things or IoT stands at the core of digital transformation along with blockchain, VR, AR, and other forefront technologies. Healthcare organizations will undoubtedly benefit from adopting IoT. According to a recent report on PRNewswire, the global market’s volume for IoT sensors in healthcare accounted for $1.1 billion in 2017. The report also forecasts the market to reach $1.9 billion by 2022, growing at 12.7% CAGR. Still, the increasing interest in connected devices and dedicated enterprise mobile development inevitably clashes with security concerns. While regular security breaches in healthcare carry a threat to sensitive clinical and patient identity data, IoT breaches can put patient health at risk.

Cybersecurity Vs. User-Friendliness – Can We Have Both?

July 24, 2018 No Comments

In the digital era that we live in, security is the most important aspect when it comes to our online activities. Another aspect is the user experience, which has become more and more vital, especially in recent years. Bad news is that it is believed that in many ways, these two aspects are kind of opposite, given the fact that some people think that good security is equal to a less friendly user experience.

IT Briefcase Exclusive Interview: Why SMBs Desperately Need Cyber Insurance and How to Select the Best Coverage

July 23, 2018 No Comments

Cyber attacks have become an unfortunate yet inevitable part of doing businesses today. And in the past few years, small and medium-sized businesses (SMBs) have emerged as a major attack target. In fact, according to the Ponemon Institute, more than 55 percent of SMBs experienced a data breach involving customer and employee information in just the past 12 months.

How the Need for Online Security has Changed the Business World

July 23, 2018 No Comments

So much of the modern business world is now focused around computers. From the way colleagues distributed across countries or even continents can communicate in real-time to file storage solutions located in the cloud, firms are now more likely than ever to be online. But with the benefits of Internet business come the risks, and online security is also now high on the agenda. This article will look at how businesses have had to adapt to a risky new world of cybercrime, hacking, data loss and more.

IT Briefacse Exclusive Interview: The Many Benefits of Sophisticated Forensic Software

July 17, 2018 No Comments

Veteran technology leader Martin Riegel recently was named Chief Executive Officer of STRmix Ltd., the newly formed subsidiary of the Institute of Environmental Science and Research (ESR). IT Briefcase had an opportunity to talk to Riegel about his background in technology and his plans for STRmix Ltd., which was founded to better serve customers of STRmix – the sophisticated forensic software used to resolve mixed DNA profiles previously thought to be too complex to interpret.

3 Ways to Make Your Business Safer

July 10, 2018 No Comments

Making sure that your business is a safe and protected environment is very beneficial when it comes to making a more productive and creative workspace. If your employees are more concerned about health and safety issues than they are about maintaining high levels of customer satisfaction, then you have a problem. Creating a safer business means a multi-pronged approach that will cover every potential risk that your company faces and devising a strategy that minimizes those risks.

How Adaptive Cyber Security Can Enable Digital Health Adoption

June 27, 2018 No Comments

Digital health focuses on connecting the systems, tools, medical devices, and services together that deliver needed healthcare to each of us and gives critical data insights to each player across the healthcare delivery landscape that weren’t available before. According to the recent 8th Annual Industry Pulse Report from Change Healthcare, security and privacy concerns are causing healthcare payers and providers to strongly reconsider whether or not they want to adopt these digital health technologies and mobile tools.

Helping Address GDPR Compliance Using Oracle Security Solutions

June 25, 2018 No Comments

This whitepaper explains how Oracle Security solutions can be used to help implement a security framework that addresses GDPR.

Oracle Perspective: The Rise of the Cloud Security Architect

June 25, 2018 No Comments

As organizations are adjusting their priorities around a cloud-centric strategy, one position has stood out as one of the most central and strategic in meeting security and compliance milestones—the Cloud Security Architect (CSA).

Keeping Pace at Scale: Results From Oracle and KPMG Cloud Threat Report 2018

June 25, 2018 No Comments

View this infographic to view the results from a recent Oracle and KPMG cloud threat report 2018.

How to Improve Your Online Privacy and Security in 8 Easy Steps

June 25, 2018 No Comments

With recent news about both Facebook and Google keeping an eye on our personal info, online privacy and security are more important than ever. If some of us continue to take them lightly, we will end up losing them to hackers. We must make sure to protect every bit of crucial data we store on our computers, tablets, and smartphones. Absolute privacy when using the Internet is a myth. Someone somewhere is always spying on our online activities. Don’t go thinking that you have nothing to hide, as most people do.

What can you do with your Cryptocurrency?

June 25, 2018 No Comments

With the fuss happening due to cryptocurrency, there are a lot of people trading it in the society. Besides the trading, people aren’t aware of the products and services that they could get through the cryptocurrency. You must also check how to invest in ICO to utilize your cryptocurrency.

Cybersecurity and the Evolution of Managed Security Services

June 20, 2018 No Comments

What can cybersecurity learn from economics? Some might recognize the current skills gap as a product of demand outstripping supply. This is great news for the computer science major hoping to capitalize on years behind the keyboard. Less so for the chief information security officer (CISO) whose budget may not allow for extravagances like hiring a fully-staffed team. Another economic lesson deals with the so-called law of diminishing returns.

Is Your Router Leaving Your Internet-Connected Devices Vulnerable to Hackers?

June 19, 2018 No Comments

Ubiquitous as they are in our households, relatively few consumers are conscious of the firmware running on their home router – let alone the urgency of keeping that firmware up-to-date. A study by Ubuntu, an open source OS, has found that only 31% of consumers execute firmware updates on their routers when they become available, and that four in ten never update firmware on their devices at all.

Why Cybersecurity is a Growing Concern in Fintech in 2018

June 19, 2018 No Comments

For the past few years there has been a significant capital infusion in the fintech ecosystem . According to KPMG fintech reports, the total global investment in this sector in the years 2015, 2016, and 2017 reached $122 billion. Two subcategories, insurtech and blockchain, are the most investment-attractive with over $2 billion and $500 million correspondingly of venture capital (VC) investment in the last year. It would be fair to say that fintech is not an immature market anymore because investors are done with experiments and come in with definite strategic goals.

Top Three Ways Veritas Access enables the Multi-Cloud

June 15, 2018 No Comments

ecent research found that 74% of enterprises currently use two or more different cloud infrastructures. Why? Because multiple clouds can offer better overall performance, eliminate vendor lock-in and improve your ability to address different business needs. The problem is that multiple clouds also add complexity that can make it more difficult to manage and protect your data in and across all these different environments. The brief, “3 ways Veritas Access enables multi-cloud adoption,” explores the data protection challenges created by multi-cloud adoption, what to look for in a solution, and the three ways Veritas Access can help you manage and protect your data in and across multiple clouds.

IT Briefcase Exclusive Interview: The Current State of Authentication

June 13, 2018 No Comments

With the explosive growth of the IoT market and the ubiquity of smartphone apps with access to personal and sensitive user data, it has become crucial to ensure that user authentication is secure, accurate, and immediate. Today we talk with Alexey Khitrov, CEO of ID R&D, about his perspective on the current state of authentication, and what smart businesses can do to protect customers’ security while simultaneously making users’ experience less painful and frictionless.

Facial Recognition Within a Business: Pros and Cons

June 12, 2018 No Comments

Facial recognition technology (FRT) was once seen as a fictional concept. Companies would use it as a tool to eradicate crime. However, today’s technology has revolutionized facial recognition and made it a practice in everyday lives. Applications such as Amazon’s Recognition and Apple’s ID technology have made facial recognition a more realistic than fictional concept. Perhaps you have been wondering what is facial recognition and how does artificial intelligence work.

Could Accepting Cryptocurrencies Help Your Business?

June 11, 2018 No Comments

Cryptocurrencies of all kinds are beginning to take over the world, and with a huge number of benefits such as transparency, its decentralised nature, and its global accessibility, it’s easy to see why a number of businesses are looking to integrate these digital payments. With big brands such as Microsoft already integrating this type of technology, smaller businesses and start-ups are looking to follow their lead. Here, we’re taking a closer look at whether or not accepting cryptocurrencies could actually help your business in the long run.

IT Briefcase Exclusive Interview: The Value and Incresed Use of Facial Recognition Software

June 8, 2018 No Comments

In this interview, we talk to Brian Strock, Manager, Public Safety Group at Numerica Corporation, about facial recognition software, the increased use of this technology by law enforcement, and Numerica’s latest software solution, Lumen FR.

Understanding the Latest Cybersecurity Threats

June 4, 2018 No Comments

Digital threats are constantly evolving and even the most stringent security efforts may prove to be insufficient should they fall behind the times. Just as cyber-attacks have grown more sophisticated, technologies like cloud computing or the growing number of ways that mobile applications are finding their way into everyday life means that the consequences of a data breach or attack have never been more serious.

Software Solutions: Your Fast Track to GDPR Compliance

June 1, 2018 No Comments

The General Data Protection Regulation (GDPR) has arrived and many companies in the EU and U.S. are racing to get their security and privacy processes in place, even after the May 25th deadline. If your organization isn’t 100 percent compliant yet, you’re not alone. A survey conducted by the Ponemon Institute in April revealed that out of the 1,000 EU and U.S. companies in a variety of sectors who were surveyed, only 42 percent expected to be in compliance with GDPR by the deadline.

Infographic: The Importance Of An IT Asset Disposition Strategy

May 31, 2018 No Comments

Companies are increasingly concerned with IT Asset Disposition (ITAD), according to a recent global survey conducted by IDG Research Services. Several factors are pushing them to create a formal ITAD policy, with IT and business leaders knowing that if their policies fail, the consequences are substantial.

Little-Known Ways Hackers Pilfer Your Personal Information

May 29, 2018 No Comments

You’ve likely heard of some of the more common ways online hackers can steal your information and commit identity theft, but there are more than a few additional vulnerabilities that might shock you. Remain diligent in your efforts to protect your passwords while you’re online, but make sure you stay up-to-date on the newest ways hackers can worm their way into your life, your personal information and your finances.

Data Preparation is the Key to Good Analytics

May 25, 2018 No Comments

The proper preparation of data influences the type of analysis which can be performed with data analytics tools. The less prepared data is, the more difficult it will be for data analytics to be performed and for end-users to answer questions in a simple manner. Also, effective data preparation and modelling has a major influence on the overall performance of a business, so proper data preparation is key for business operations, not just good analytics.

Why Should Disaster Recovery Services be the backbone of any resilient business?

May 24, 2018 No Comments

Back when technology was less advanced, companies that wanted to protect their working environment and infrastructure from disastrous outages had to either double up on existing hardware, squeezing it into their cramped premises or rely on slow, unreliable backup media. Nowadays, thanks to Cloud Computing technology businesses can rely on professional and effective Disaster Recovery as a Service, that not only offers a more reliable recovery plan but a true resilience. Read below, if you want to retain your business operating, no matter what.


Gartner IT Operations

SuperCharge Your Cloud

American CISO

IBC 2018

ITBriefcase Comparison Report

We have updated our Privacy Policy. Click here to preview.