IT disaster recovery, cloud computing and information security news
- Details
Carbon Black has published the findings of a new CIO survey into current approaches to breach detection and response. The survey found that 82 percent of CIOs are under increasing pressure from the business to prevent, detect and respond to security incidents faster.
- Details
A new study by US-based IMA (Institute of Management Accountants) and UK-based ACCA (Association of Chartered Certified Accountants) asks the question ‘Does your finance function have a plan to fail?’
- Details
The US Department of Homeland Security and the Department of Justice have issued guidelines to assist organizations with implementing the requirements of the Cybersecurity Act of 2015.
- Details
Paul German highlights five essential do’s and don’ts for retailers to consider when putting strategies in place to keep customer data protected from hackers.
- Details
By Professor Avishai Wool.
Distributed denial of service (DDoS) attacks are an old attack vector but they continue to be popular; and highly effective.
- Details
Not only does a software-defined data center / centre provide CIOs with a way to improve disaster recovery and combat shadow IT, but it is also the first step in moving toward a truly service-defined enterprise and acts as the catalyst that redefines the CIO’s role from technologist to business enabler and innovator.
- Details
Tripwire, Inc., has published the results of an extensive study conducted by Dimensional Research on its behalf. The study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls that must be in place to quickly detect a cyber attack in progress.
- Details
The prpl Foundation, an open-source non-profit organization, has announced the availability of a new document, ‘Security Guidance for Critical Areas of Embedded Computing’, which describes a hardware-led approach to connected device security
- Details
Paul German looks at the specific security issues with VoIP session initiation protocol and explains why the risks need to be taken seriously. It’s time to think differently about SIP security: before it is too late…
- Small businesses “hugely underestimating impact of a cyber attack”
- New report looks at ‘Security breaches – what’s the real cost to your business?’
- The top five factors to consider when outsourcing security
- Barclays becomes the first financial institution to support INTERPOL efforts in combating cybercrime