IT disaster recovery, cloud computing and information security news
- Details
A new report, ‘On the Radar’, from Ovum shines a light on the extent of the mobile security problem affecting businesses of every size around the globe. It exposes the inadequate level of mobile device protection offered by most mainstream endpoint security providers
- Details
Without knowing it, many organizations have repeatedly punched holes into their once-secure perimeter says Ian Kilpatrick. While security is no longer mainly about perimeter protection, it is still a vital element…
- Details
The US Department of Homeland Security (DHS) has published ‘Strategic Principles for Securing the Internet of Things (IoT), Version 1.0,’ a set of principles that highlight approaches and suggested practices to fortify the security of the IoT.
- Details
Kaspersky Lab’s discovery in 2016 of an APT able to create new tools for each victim has effectively killed off ‘indicators of compromise’ (IoCs) as a reliable means of detecting malware infection, according to the company’s Threat Predictions for 2017.
- Details
Continuity Software has announced the release of its 2016 Private Cloud Resiliency Benchmarks. Based on data gathered from over 100 enterprise environments over the past year, the study found that downtime and security risks were present in each cloud environment tested.
- Details
DevOps is one of the emerging trends which is changing the way organizations implement software and it brings availability, security and resilience advantages. Gerardo Dada explains what DevOps is and looks at some of the pre-requisites for its introduction.
- Details
NIST has published its Special Publication 800-160, entitled 'Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems.'
- Details
Organizations need to take a new approach to information security if they are to successfully protect their networks and assets. Zero trust is the way forward to a more effective, simpler and more consistent security architecture says Adam Boone.
- Details
Enterprises today are employing hybrid IT as they struggle to keep up with digital transformation, according to the recently released Harvard Business Review Analytic Services report ‘Hybrid IT Takes Center Stage’.
- IT managers believe that the weakest link in information security is employees flouting security policies
- More than 90 percent of employees violate information security policies
- One in three targeted cyberattacks results in a security breach: Accenture Survey
- Tech giants work to together to develop new Zero Outage industry standard