IT disaster recovery, cloud computing and information security news
- Details
Businesses often overlook the usefulness of service management tools that they already have at their fingertips as a way to streamline and effectively manage internal risk processes. Dean Coleman looks at some practical steps that businesses can take to utilise these for effective IT risk management.
- Details
Thales has announced the publication of its 2016 Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales and Vormetric Data Security, reveals that the use of encryption continues to grow
- Details
KPMG has published its Cyber Watch Report, which identifies five key cyber security trends impacting Canadian businesses. Increased risks of ransomware and extortion-driven attacks and the rise of the Internet of Things (IoT) are challenging organizations in new ways.
- Details
Cybersecurity is now high on many organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table.
- Details
Shavlik has published its annual research into the key security challenges facing the IT industry. The study found that after a year of repeated security breaches and data losses, more than half (58 percent) of IT professionals are more concerned about system security than they were 12 months ago.
- Details
Proofpoint, Inc., has released its annual Human Factor cybercrime report. In 2015, attackers significantly shifted their strategy to fool humans into becoming unwitting accomplices in the quest to steal information and money.
- Details
According to a new PwC survey there has been a double-digit rise in crime against UK corporates, as cyber becomes the fastest growing economic crime.
- Details
New research from the Cloud Industry Forum (CIF) has revealed a distinct lack of confidence in disaster recovery and backup capabilities. The survey asked participants to identify which applications represented the biggest risk to their business in the event of failure. Disaster recovery and data backup services were ranked the highest priority amongst those surveyed.
- Details
Jeff Harris explores the security blind spot created by growing volumes of SSL-encrypted data, and how to approach SSL inspection to get complete visibility of threats without compromising performance.