IT disaster recovery, cloud computing and information security news
- Details
ISO/IEC 27001, ‘Information security, cybersecurity and privacy protection - Information security management systems - Requirements’ the widely used information security management standard, has been updated and is now available.
- Details
The OpenSSL Project, the organization that maintains the widely used OpenSSL software, has issued a vulnerability patch flagged as High severity. Prior to the announcement the release was widely briefed as being of 'Critical' severity.
- Details
Cyber security and acronyms seemingly go hand in hand and every year there are new ones to learn and remember. From APTs and ZTNA to CASB and SIEM, the world of cyber security is full of them. Markus Strauss looks at CNAPP, one of the newest additions to the acronym list.
- Details
The Australian Institute of Company Directors (AICD) and the Cyber Security Cooperative Research Centre (CSCRC) have released a new set of governance principles to help organizations strengthen their cyber resilience.
- Details
The latest Allianz Global Corporate & Specialty cyber report provides an overview of developments in the cyber threat landscape. ‘Cyber: The changing threat landscape’ says that ransomware remains a top cyber risk for organizations globally while business email compromise incidents are on the rise
- Details
CloudSEK says that analysis by its contextual AI digital risk platform, XVigil, has discovered several critical and high-severity vulnerabilities affecting Veeam Backup & Replication.
- Details
Distributing workloads across multiple locations helps users achieve resiliency. Users should be aware, however, that greater duplication can mean both higher costs, and greater carbon emissions. A new report from the Uptime Institute has explored this issue.
- Details
A new report published by the European Union Agency for Cybersecurity (ENISA) explores the necessity to design new cryptographic protocols and integrate post-quantum systems into existing protocols.
- Details
The 3-2-1 rule has been at the heart of successful data protection strategies for many years. Christopher Rogers looks at whether it still has relevance in today’s rapidly changing technology and threat environment.
- Report shows that organizational confidence in cyber and technology resilience decreases
- Financial Stability Board proposals aim for more uniformity in cyber incident reporting
- Cloud Server Privilege Management for Dummies eBook launched
- Cyber insurance and identity threat detection and response: partners in resilience