IT disaster recovery, cloud computing and information security news
- Details
SIOS Technology has completed a survey report to understand current trends and challenges related to the general state of HA (highly available) applications in organizations of all sizes.
- Details
ShareBackup, a strategy developed by researchers at Rice University lab, allows shared backup switches in data centers / centres to take on network traffic within a fraction of a second after a software or hardware switch failure.
- Details
Network management can sometimes be a neglected afterthought, yet the availability and reliability of the network is essential for a whole host of mission-critical activities. Kevin Drinkall challenges organizations to consider whether they are giving enough attention to their network.
- Details
Managing the challenge of data management, retention and availability is an ongoing issue for most organizations. In this article, Gordon Cullum explains where data virtualization can help; and where it won’t.
- Details
New research from Check Point Software Technologies Ltd has shown how organizations and individuals could be hacked via their fax machines, using newly discovered vulnerabilities in the communication protocols used in tens of millions of fax devices globally.
- Details
The Cloud Security Alliance (CSA) has published a document that provides an in-depth analysis of the main cloud computing threats. ‘Top Threats to Cloud Computing: Deep Dive’ provides technical details dealing with architecture, compliance, risk and mitigations for each of the cloud computing threats and vulnerabilities identified in a previous CSA survey.
- Details
Tripwire, Inc., has released its ‘State of Cyber Hygiene’ report, which finds that more than 60 percent of organizations not leveraging established hardening benchmarks.
The survey, conducted in July in partnership with Dimensional Research, included responses from 306 IT security professionals.
- Details
GDPR essentially forces companies to go public with any cyber attack they suffer, which poses further challenges when it comes to protecting their reputation. However, a quick and effective response to a cyber attack is impossible without thorough planning and forethought. Jonathan Hemus offers some points to consider...
- Details
Nozomi Networks’ Co-founder and Chief Product Officer Andrea Carcanco has warned about the dangers of future TRITON-like attacks. At the recent Black Hat USA conference, Carcanco presented a live recreation of the industry’s first direct attack on an industrial safety system, showing that the TRITON malware creation may have been much easier to achieve than originally thought
- Accenture report identifies five global cybersecurity threat trends
- FBI warns about the use of Internet of Things devices as proxies by cyber actors
- Spam is still the delivery method of choice for cyber attacks: and it’s becoming more successful
- Security operations centers being limited by skilled staff shortages