IT disaster recovery, cloud computing and information security news
- Details
The way that organizations communicate in the first few moments of a service outage is crucial, no matter the size of the problem…
By Teon Rosandic.
- Details
Softchoice has released findings based on an analysis of nearly 52,000 networking devices at more than 200 organizations. Softchoice found that 60 percent of businesses have end-of-support devices operating in networks
- Details
As organizations worldwide continue to fall victim to cyber-attacks made possible by the mistakes of their own network administrators and users, a new report shows how CEOs can take a cue from the US military and create high-reliability organizations (HROs) that consistently guard against cybercrime.
- Details
The National Cybersecurity Center of Excellence (NCCoE) is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control systems.
- Details
By Brandon Tansey, security research engineer, Lancope.
The seemingly endless barrage of attacks on government and enterprise networks has made it clear that organizations need to be much more proactive when it comes to security.
- Details
Logicalis US says that there is a growing misperception that data that resides in the cloud is automatically protected just because it’s in the cloud. This, the company warns, is absolutely not the case.
- Details
Centrify Corporation has published the findings from a recent survey it commissioned to determine penetration and security compliance of Apple devices in the workplace.
- Details
Citrix and Terminal Servers provide highly valuable functionality for session-based access, but to date have had an Achilles heel when it comes to privileged account management across multiple users. It’s time for organizations to secure this potential threat vector.
- Details
Weaker security at professional services firms than their larger and better-secured clients can offer back-door entry into clients’ systems, says Ian Kilpatrick.