Folder Information security

Documents

default What are nation state information security attacks really telling us? Popular

By 2294 downloads

A change is necessary in the mind-set about how we protect IT to an approach that sees attacks as a part of doing business.

default What should a cyber incident playbook include? Popular

By 882 downloads

Charlie Maclean Bristol explains why developing a playbook for the main types of cyber attacks will help businesses response effectively when an attack occurs. He also provides a checklist covering the areas that such a playbook should include.

default What to look for in a next generation privileged access management solution Popular

By 500 downloads

A security breach of a privileged account is a nightmare that organizations hope they will never need to respond to. Alan Radford explains how next generation privileged access management (PAM) solutions provide assurance in this area; and what such a PAM should include.

default Why are employees shunning security? Popular

By 2215 downloads

Information security often seems to be an internal battle ground, with the organization attempting to impose ever more restrictive security and employees continually looking for ways round it to make their jobs easier and more productive. Per Stritich explains why this situation occurs and what to do about it.

default Why being proactive is the key to effective cyber security… Popular

By 780 downloads

Traditional cyber security is based on protecting the organization with barriers and reacting to any breaches that occur. Dean Moulden explains why this is no longer effective: and why taking a proactive, zero trust, approach is now essential.

default Why cyber resilience and security leadership must come from the top of organizations Popular

By 291 downloads

In this article, Rick Jones suggests that, rather than finding someone to blame when security measures fail, it is imperative that company executives and boards take the lead when it comes to cyber resilience and security.

default Why data backup and recovery need to be part of your zero trust security program Popular

By 158 downloads

Zero trust is increasingly being accepted as part of a holistic cyber resilience strategy. Florian Malecki points out the importance of including backup and recovery within zero trust and highlights some issues to consider.

default Why insider threats are succeeding Popular

By 2222 downloads

Many companies still lack the means or motivation to protect themselves from malicious insiders; but the effects of insider threats are simply too big to ignore. In this article TK Keanini looks at the practical steps that organizations can take to protect data and systems from insider threats.

default Why it’s time for a new approach to penetration testing… Popular

By 2103 downloads

Traditional approaches to penetration testing have been overtaken by the changes in information security threats that we have seen in recent years. Nick Rafferty explains why this is the case and what can be done about it.

default Why organizations need to move to an application-centric approach to security management Popular

By 2081 downloads

Kyle Wickert explains what an application-centric approach is and why organizations need to start adopting it for security management. Moving towards an application-centric approach may be easier than you expect...

default Why security need not stifle agility Popular

By 2315 downloads

Many CIOs are struggling to realise the full benefits of their increasingly virtualized IT estates, largely due to the strains of staying secure. But Reuven Harrison says it doesn’t have to be this way...

default With attacks on the rise, how can SCADA security be improved? Popular

By 2364 downloads

Deborah Galea outlines five steps that can be taken to tighten up the security of SCADA systems.

default Zero trust security: what it is and why adoption is increasing Popular

By 295 downloads

Every step you take in your organization’s zero trust journey reduces your risk of downtime, data breaches and compliance failures, so the time to start implementing it is now, says Bryan Patton. Here he explores why so many organizations are moving to zero trust and how to take your first steps.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.