Why insider threats are succeeding
- Details
- Published: Thursday, 28 May 2015 06:52
Many companies still lack the means or motivation to protect themselves from malicious insiders; but the effects of insider threats are simply too big to ignore.
Many companies still lack the means or motivation to protect themselves from malicious insiders; but the effects of insider threats are simply too big to ignore.
Dave Larson, CTO at Corero, explains why DDoS attacks are often a diversionary tactic, allowing other attack vectors to be placed on the network unnoticed.
DataCore has published the results of its Fifth Annual State of Software-Defined Storage (SDS) survey. The 2015 poll explored the impact of SDS on organizations across the globe
To ensure the availability of high performance, mission critical IT services, IT departments need both solid monitoring capabilities and dedicated IT resources to resolve issues as they occur. But even with the right tools in place, when an abundance of alerts and alarms start streaming in, it can quickly become overwhelming
LogicNow has published the results of its Global IT Service Providers Harmony Report, an annual healthcheck of the global IT Service Management market.
New research from Juniper suggests that the rapid digitisation of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019, increasing to almost four times the estimated cost of breaches in 2015.
A survey of 200 UK organizations, conducted by Vanson Bourne on behalf of Tenable Network Security, Inc., has found that one in ten organizations do not think that cyber security is a priority for them, with a further 61 percent confirming it is not seen as a top three priority.
Any business – whether big or small – can be damaged as a result of even a few hours of downtime. Lost revenue equates to loss of customers, not to mention permanent loss of data. Managed service providers (MSPs) are no exception to this rule and have a responsibility to put a strong back-up policy in place
Mike Potts reflects on the recent RSA conference and the lessons that need to be taken from it.
The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.
Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.