Inside the Briefcase


IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

with Shawn Moore, Solodev
In this interview, Shawn Moore, CTO of web experience platform, Solodev, speaks to IT Briefcase about the rise in cloud computing and the challenges cloud migration posed for businesses—particularly the enterprise. Read More >>>

Legacy Modernization: Look to the Cloud and Open Systems

Legacy Modernization: Look to the Cloud and Open Systems

On the surface, mainframe architecture seems relatively simple: A centrally located computer processes data through an input/output subsystem and stores its computations in memory. At the other end of the mainframe are printers and terminals that communicate with the...

Still keeping your hybrid power systems indoors?  It’s time for change.

Still keeping your hybrid power systems indoors? It’s time for change.

Mobile telecommunications network equipment is expected to work without issue 24/7. There is no compromise on this, which is why transmission equipment, BTS systems, RF equipment, etc., are designed, tested and built for operation in the most demanding...

As the Network Changes, Engineers Are Embracing the DevOps Model

As the Network Changes, Engineers Are Embracing the DevOps Model

Businesses that have embraced digital transformation with a clear strategy are outperforming their peers. A Capgemini study found that digitization leaders generate more revenue, are more profitable and enjoy higher market valuation. This transformation requires making rapid changes to...

How Machine Learning Helps Improve the Security Industry

How Machine Learning Helps Improve the Security Industry

We’ve been moving more and more towards computerized processes in our daily lives for a long time now, but the full extent of this technology is yet to be fully realized; the potential applications of this technology are both...

Transformation on a Global Scale

Transformation on a Global Scale

Necessity may be the mother of invention, but it’s people that make it happen. For an IT organization to help transform an institution, the individuals in the technology group need to make a concerted effort to look beyond their...





Briefcase Highlights


SECURITY

The Threats to Network Security Are Rising – What’s an Enterprise To Do?

May 24, 2017 No Comments

Businesses are grappling with new threats to network security, as rising challenges from evolving malware to the emerging Internet of Things landscape and beyond put networks and sensitive data more at risk. Jeff Finn, CEO of zvelo, offers his insights into the state of network security today, and what businesses need to be aware of in addressing these threats.

The big security threats your organization needs to take seriously now

May 23, 2017 No Comments

As a security expert, you’ve seen dozens of top-10 lists and other articles about the major security threats your organization faces. But there are two threats you may not be taking seriously enough.

WannaCry? Spare the Tears with a Health Check

May 19, 2017 No Comments

By now, unless you are living under a rock or have gone into some sort of self-imposed exile, you’ve heard about the havoc WannaCry is wreaking on PCs worldwide. In no time at all, this sneaky worm took advantage of systems that had yet to apply a patch for certain vulnerabilities. Shooting across tens of thousands of organizations on Friday, WannaCry affected more than 300,000 systems in over 150 countries, and it’s being dubbed the biggest ransomware offensive in history.

5 Elements of Secure Work at Home Programs

May 16, 2017 No Comments

The practice of allowing employees to work from home has skyrocketed in recent years. This model allows employees to be more productive and gives companies access to a wider pool of talent and lower overhead costs. With these strong drivers pushing the trend, more than 50 percent of the workforce is expected to work remotely by 2020, according to Fast Company.

Why Adaptive Security is Critical Today, and How to Achieve It

May 11, 2017 No Comments

In 2004, the global cybersecurity market was worth $3.5 billion – and in 2017 Cybersecurity Ventures expects it to be worth more than $120 billion. In other words, the cybersecurity market grew roughly 35-fold in 13 years. This huge increase in spending is being fueled by the dozens of zero-day threats, millions of new malware variants and other attack types that organizations both large and small face each year.

Securing Immutable Servers in a Serverless World

May 10, 2017 No Comments

Snowflakes are beautiful, unique creations. But, let’s keep them in nature. They don’t belong in our server infrastructure. Snowflake servers, where every configuration is just a little different, can introduce unnecessary security vulnerabilities and complications. While common in IT infrastructure, in the DevOps realm, they are gradually becoming ancient history.

How Will a Data Breach Affect Your Brand?

May 9, 2017 No Comments

Make no mistake, data breaches are disastrous. There have been some howlers over the last twelve months, with thousands of leaked emails from the Democratic National Committee entering the public domain on the eve of the presidential election, a massive MySpace hack, and the unwelcome news for Verizon enterprise customers that their data was now in the public domain.

If Most IT Security Professionals are Aware of GDPR, Why Are Less than Half of US Businesses Preparing?

May 4, 2017 No Comments

Well-talked about in international circles, the European General Data Protection Regulation (GDPR) is a new regulation to protect the privacy of European citizens – however, many people may not realize that it applies to all businesses that hold and process personal data collected in the European Union, regardless of their industry or location. It becomes effective on May 25, 2018, so there is just over a year to prepare. It sounds like a long way off, but will there be enough time for your company to comply?

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

May 1, 2017 No Comments

with Shawn Moore, SolodevIn this interview, Shawn Moore, CTO of web experience platform, Solodev, speaks to IT Briefcase about the rise in cloud computing and the challenges cloud migration posed for businesses—particularly the enterprise. Read More >>>

IT Briefcase Exclusive Interview: Combating the Employee Threat to Data Security

April 28, 2017 No Comments

with Cam Roberson, Beachhead SolutionsIn this interview, Cam Roberson, Director of the Reseller Channel at Beachhead Solutions, shares his perspective on how device security technology is addressing this need across industries. Read More >>>

Cybersecurity Is No Longer Just the CISO’s Job

April 27, 2017 No Comments

Tweet Featured article by Chris Riley, President of U.S. Operations, SSH Communications Security Cybersecurity is often seen as a necessary evil in terms of business flow and budget. In 2020, organizations are projected to spend $101.6 billion on cybersecurity software, services and hardware, according to IDC. In addition to depriving businesses of money that could […]

Can’t Miss! Tech Forum in Boston: Accelerate Time-to-Strategy Execution

April 25, 2017 No Comments

Join bpm’online on May 11-12 in Boston, MA to hear from key industry experts, learn best practices and success stories on how to leverage intelligent tools to adapt and transform your business faster.

6 Ways to Be Your CISO’s Security Team MVP

April 20, 2017 No Comments

Security maturity, as cliché as it sounds, is a journey – not a destination. Security isn’t something that can ever be considered “done” because there will always be new technologies, business objectives or processes to secure and align with. The good news is you don’t have to be a CISO to affect changes in an organization. If you’re a dedicated security professional, you can absolutely help guide how security is implemented in your organization, as well as how security is perceived to the larger organization. Incorporate the following 6 tips into your professional role and make yourself and the security team look like total pros!

IT Briefcase Exclusive Interview: Should you put your “eggs in one cloud basket”?

April 19, 2017 No Comments

with Carson Sweet, CloudPassageIn this interview, Carson Sweet, CTO and co-founder of CloudPassage, has evaluated why a provider might push for one cloud environment deployment option and how secure migrated data might be in those environments. Read More >>>

IT Briefcase Exclusive Interview: IT and Procurement Should Partner Up As a Superpower

April 18, 2017 No Comments

with Chris Crane, Scout RFPIn this interview, Chris Crane, co-founder and VP of product at Scout RFP, explores not only why joining IT and procurement forces is a smart move for any business, but also some tips on how to bring both departments together to form the ultimate power couple. Read More >>>

Legacy Modernization: Look to the Cloud and Open Systems

April 17, 2017 No Comments

On the surface, mainframe architecture seems relatively simple: A centrally located computer processes data through an input/output subsystem and stores its computations in memory. At the other end of the mainframe are printers and terminals that communicate with the mainframe through protocols. For all of its apparent simplicity, mainframe architecture can be extraordinarily complex. Mainframes process thousands of transactions per second and require an extensive infrastructure to house and maintain them.

Safeguarding Company Laptops – Here’s What you Need to Know

April 13, 2017 No Comments

Every 60 seconds a laptop is stolen, according to two separate studies by Gartner and Dell. In those 60-seconds, a stolen laptop probably isn’t the only loss. It’s more than simply replacing the hardware – in the wrong hands, a lost or stolen device could cost a company upwards of $4 million, which is the average cost of a data breach.

How Hackers Are Improving Internet Security

April 11, 2017 No Comments

On the internet, data is constantly under siege by cybercriminals. According to a study by Hewlett-Packard, cybercrime costs businesses more than $9.5 billion each year, and that number continues to rise. On top of that, 27% of all malware ever detected were recorded in 2015 alone. Clearly, cybercrime and other illicit hacking poses an increasing threat to companies across the world. To combat this growing menace, many companies are turning to hackers to make sure their systems are secure and their data cannot be breached by nefarious persons or organizations.

8 Factors that Influence Enterprises in Choosing the Right Desktop Management Solution

April 11, 2017 No Comments

Enterprises deal with complexities related to desktop management everyday. Desktop management has changed a lot from what it was few years back, with respect to innovation and cost effectiveness. System administrators face lot of issues being raised on a daily basis, having the right solution to take care of all your desktop management activities is going to be rewarding.

Still keeping your hybrid power systems indoors? It’s time for change.

April 5, 2017 No Comments

Mobile telecommunications network equipment is expected to work without issue 24/7. There is no compromise on this, which is why transmission equipment, BTS systems, RF equipment, etc., are designed, tested and built for operation in the most demanding of environmental conditions.

WatchGuard Launches New Quarterly Internet Security Report

March 30, 2017 No Comments

WatchGuard® Technologies, a leader in advanced network security solutions, today released the findings of its inaugural quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. The report covers the top network and malware trends from Q4 2016, examines the most notable cyber security stories, details new research from the WatchGuard Threat Lab, and provides practical defense tips for security professionals.

Cybersecurity and small businesses – why it matters

March 29, 2017 No Comments

All businesses, regardless of size, are susceptible to cyberattack. 2016 catapulted corporate hacking into the spotlight, making all those associated with business, from executive to customer, a potential target. The suggestion that Russia may have influenced the recent American election testifies to the threat of hacking and the current data around cybercrime is truly shocking. The hacking threat is particularly dangerous to small businesses who may not have the resources to protect against an attack.

Hackers! This Is Why We Can’t Have Nice Things

March 28, 2017 No Comments

When the history of internet memes is written, one of the top ten entries will surely be “This Is Why We Can’t Have Nice Things”. This catchphrase is used in response to a topic thread that has deviated from its original purpose. The popularity of this catchphrase is borne out by how much it has spread into popular culture, particularly in the world of internet-connected devices that started out with the promise of facilitating great productivity gains, but that are now seeing those gains reduced by hackers and cyberthieves who are exploiting the vulnerabilities of those devices.

As the Network Changes, Engineers Are Embracing the DevOps Model

March 28, 2017 No Comments

Businesses that have embraced digital transformation with a clear strategy are outperforming their peers. A Capgemini study found that digitization leaders generate more revenue, are more profitable and enjoy higher market valuation. This transformation requires making rapid changes to the network without taking critical systems offline – no easy task. An organization succeeds at this process when its customers are unaware that the changes are taking place because no services are being disrupted.

Section 508 Refresh Seeks Digital Access to All

March 23, 2017 No Comments

It is time for government agencies to take heed of accessibility requirements. The Architectural and Transportation Barriers Compliance Board (also known as the Access Board) delivered a final rule, effective March 21, concerning the contemporary implementation of Section 508 of the Rehabilitation Act of 1973, which relates to ensuring the availability of accessible IT in the federal workplace. Because technology is constantly evolving, this “refresh” serves to address technological advancements and keep the Rehabilitation Act current.

Does IoT Create a Car Security Problem?

March 23, 2017 No Comments

Vulnerabilities that allow smart vehicles to be hacked by unauthorized users can lead to a wide range of potentially serious problems and issues. With greater numbers of vehicles that rely on sophisticated digital automation and enhanced connectivity hitting the road each year, drivers would do well to learn more about the potential risks that may increase the likelihood of a data breach as well as the steps and efforts that may allow them to better protect themselves. From minor irritations to potential safety concerns, addressing any underlying vulnerabilities or security concerns is often well worth the time and effort involved.

How Machine Learning Helps Improve the Security Industry

March 22, 2017 No Comments

We’ve been moving more and more towards computerized processes in our daily lives for a long time now, but the full extent of this technology is yet to be fully realized; the potential applications of this technology are both far reaching and complex, offering possibilities that we’ve not yet seen the full reach of. That’s part of the reason why it’s worth offering further attention to these policies, and to try and see where they can take us. The potential they offer can’t be ignored.

Transformation on a Global Scale

March 22, 2017 No Comments

Necessity may be the mother of invention, but it’s people that make it happen. For an IT organization to help transform an institution, the individuals in the technology group need to make a concerted effort to look beyond their jobs in order to understand the needs, struggles, and goals of the business. Only by doing so will they be able to create and bring to the table new technology-enabled solutions.

Five Dangers of Siloed Information for IT and Operations Teams

March 22, 2017 No Comments

IT and Operations workers are many things, but bored isn’t one of them. According to a survey from IT community site Spiceworks, the average IT pro logs 52 hours per workweek.From scoping projects and managing bids, managing suppliers and coordinating internally, your IT and Operations teams have to deal with a lot of moving parts.

Everything You Need to Know About Office 365 Email Encryption

March 21, 2017 No Comments

It is vital that every company, regardless of how big or small, takes the appropriate steps to secure their valuable data. From intellectual property to financial information, a cybercriminal has the knowledge and resources to target any vulnerable company at any time. To help you successfully protect your organisation, we are offering a helpful guide to Microsoft Office 365 email encryption.

ADVERTISEMENT

UC Expo

WITI

ITBriefcase Comparison Report