IT disaster recovery, cloud computing and information security news
- Details
Axcient has published the results of a survey of more than 500 IT professionals at VMworld 2016 aimed at identifying the biggest challenges in building resilience for virtualized IT environments.
- Details
Research from Ipswitch shows that fast track deployment of intelligent systems is well underway, however, the study also shows that over three quarters (78 percent) of IT professionals are struggling with assessing the full extent of the challenges and threats of deploying intelligent systems
- Details
ENISA has released a report which provides an overview of the root causes of outages and incidents in the European electronic communications sector during 2015 and an aggregation of the services and network assets that were impacted.
- Details
Attackers are using an increasingly wide range of deception techniques to muddy the waters of attribution, planting ‘false flag’ timestamps, language strings and malware, among other things, and operating under the cover of non-existent groups
- Details
Kirsten Bay explores why cyber security problems continue to grow despite the availability of innovative solutions in the market and provides five steps to help build a strategy that offers the potential to outsmart attackers.
- Details
The US-CERT has issued guidance on how to protect network infrastructure devices from increasing threats from organized hacker groups and ‘cyber adversaries’.
- Details
Employees and IT professionals in German organizations are more confident about their ability to resist the growing risks of cyber attacks and insider threats than their counterparts in the US, UK and France. Those are among the findings from a new study.
- Details
Datapac, an Ireland-based ICT solutions provider, has published the results of a survey which finds that Irish businesses expect to wait an average of 40 hours to recover mission critical data that has been lost.
- Details
Scott Register looks at how the latest malware can be mutated to evade detection by conventional defences, and how businesses can counter the threat.