Disaster Recovery News, Articles and Updates
A number of storage devices belonging to the California Department of Child Support Services went missing while in transit.
The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
A need for risk managers with specific skills in business continuity planning and disaster recovery.June 01, 2011
A need for risk managers with specific skills in business continuity planning and disaster recovery.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
As more organizations continue migrating to the cloud, what should information leaders at organizations be asking of their provider?
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
American and Russian officials recently met to discuss cybersecurity issues, such as collaboration among law enforcement bodies and the use of cyberweapons, the New York Times reported in its Saturday editions.
Just weeks after reports surfaced that foreign spies have penetrated the U.S. power grid lawmakers are now set to introduce a bill Thursday aimed at creating standards to protect the nation's critical electric infrastructure.
McAfee has launched a free Cybercriminal Response Unit (CRU), meant to be an "online 911" where cybercrime is diagnosed and treated.
The Pentagon has spent more than $100 million in the past six months repairing damage to its networks caused by cyberattacks, according to military officials.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The news comes after a serious weakness was revealed last week in the MD5 cryptographic hash function.
Certification Authorities that have not moved to a more secure cryptographic hash function than MD5 have come under fire in the security world.
Research presented at the 25th Chaos Communication Congress in Berlin demonstrated how an attacker could impersonate any website, including those secured by the HTTPS protocol.
A simulation this week demonstrated the need for better collaboration among public and private security groups.
The scale of distributed denial of service attacks has grown 100-fold since 2001, leaving some ISPs with long outages.
SC Magazine Articles
- GCHQ infosec group disclosed kernel privilege exploit to Apple
- 77% of organisations unprepared for cyber-security incidents
- 117 million LinkedIn email credentials found for sale on the dark web
- Furtim malware can run AND it can hide
- Ubiquiti warns of worm using known exploit on outdated AirOS firmware
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Spearphishing attack nets $495K from investment firm
- Updated: Gmail, Yahoo email credentials among millions found on the dark web
- Report: Ransomware feeds off poor endpoint security
- Organizations need formal vendor risk management programs, study
- 2.5K Twitter accounts hacked to spread links to adult content
- Study: Federal agencies still lack strong cyber hygiene practices
- Petya and Mischa - the Ransomware Twins (sort of)
- Bad guys update ransomware DMA Locker with version 4.0
- Lieu, Hurd urge colleagues to use encryption, improve cyber hygiene