IT disaster recovery, cloud computing and information security news
- Details
There has been a 136 percent increase in identified financial losses around the world caused by Business E-mail Compromise (BEC) attacks, says a new warning from the FBI.
- Details
Virtustream has released the findings of a commissioned study, ‘Multi-cloud Arises from Changing Cloud Priorities’, conducted by Forrester Consulting.
- Details
A new study from Aeriandi, carried out at the recent IFSEC show has found that the majority of respondents – 70 percent – believe that securing the voice channel is an important part of the IT security mix, with 68 percent stating that it should fall under the scope of IT security.
- Details
Three-quarters of UK firms in survey by FICO and Ovum say their protection is above average, and nearly half think they're a ‘top performer’. For the research Ovum conducted telephone surveys of security executives at 500 companies in the UK and 10 other countries.
- Details
In its mid-year update of the 2018 SonicWall Cyber Threat Report, SonicWall states that it has seen record numbers of malware volume, ransomware attacks, encrypted threats and chip-based attacks.
- Details
Kudelski Security has published a new research report, 'Cyber Board Communications & Metrics – Challenging Questions from the Boardroom' that features the perspectives of enterprise CISOs from large global organizations.
- Details
Gartner has published details of six emerging trends which security leaders can take advantage of to improve their organization’s resilience while elevating their own standing.
- Details
A letter from Visa to the UK Treasury Select Committee, documenting details behind the recent outage which left millions of people unable to complete card transactions, reinforces a critical challenge that organizations face when exposed to a ‘partial failure’ of IT infrastructure.
- Details
Luke Potter, Head of SureCloud’s Cyber Security Practice, explains how organizations can improve both their cyber security and compliance procedures by bringing vulnerability information together.
- Most critical endpoint security events leverage trusted tools to cloak detection
- Survey looks at disaster recovery as a service usage
- New research provides a view of how IT backup has developed over the past decade
- DNS Threat Report shows that European organizations suffer most from global network attacks