IT disaster recovery, cloud computing and information security news
- Details
The majority of businesses in North America are not fully prepared to handle a major disaster striking their IT, network and communications infrastructure according to a biennial technology survey conducted by Evolve IP.
- Details
With the threat landscape constantly evolving and cyber-criminals looking for new ways to breach organizations’ fortifications, maintaining the integrity of the business network and the data that resides there is a growing challenge.
- Details
Agari has published research revealing that 96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017.
- Details
A study by OneLogin has found weaknesses in the UK policies of many UK companies. The study, which surveyed more than 600 UK-based IT decision-makers, with influence over their business’s IT security, highlighted a disparity between Internet access and security policies.
- Details
NIST has published new guidance to assist organizations with managing security on server-deployed hypervisors. The recommendations made in the guidance relate to the baseline functions of the hypervisor and are agnostic to the hypervisor architecture.
- Details
Based on input from hundreds of IT services companies as well as industry experts and analysts, Asigra has highlighted the following five trends which are expected to drive the evolution of data protection infrastructure over the next 12 months
- Details
During last week’s Annual Meeting in Davos, The World Economic Forum announced the launch of a new ‘Global Centre for Cybersecurity’ to help build a safe and secure global cyberspace.
- Details
ENISA, the EU Cybersecurity Agency, has published the sixth issue of its annual ENISA Threat Landscape report. This includes an assessment and analysis of the cyber threats reported during 2017.
- Details
IT risks come in various shapes and sizes– some obvious and others far more difficult to predict. However, many attack scenarios are now easier to address due to the identification of threat patterns, which are a set of characteristics representing suspicious behaviors in security platforms.