IT disaster recovery, cloud computing and information security news

ENISA’s Threat Landscape 2014 (ETL 2014), which has just been published, looks at the 15 top cyber threats, cyber threat agents, cyber-attack methods and threat trends for emerging technology areas.

2014 can be characterised as the year of the data breach with many high profile data breaches demonstrating how effectively cyber threat agents abuse the security weaknesses of businesses and governments. The main lesson learned is that ‘sloppiness’ with regards to cyber security is the number one reason for breaches. This was a factor in 50 percent of the data breach cases identified in the report.

The report identifies various emerging technologies that will impact the threat landscape. These are: cyber physical systems (CPS); mobile and cloud computing; trust infrastructure, big data, and the Internet of things.

Read the report (PDF).


Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.