Business Continuity

Business Continuity | News, how-tos, features, reviews, and videos

1 lights

How to handle business continuity in a crisis

IT resilience ensures business continuity in crisis, but only if executed with forethought and diligence. Todd Scallan of Axcient suggests applying any of these six tips to make IT resilient.

quantum computing

Experts split on how soon quantum computing is coming, but say we should start preparing now

Whether quantum computing is 10 years away -- or is already here -- it promises to make current encryption methods obsolete, so enterprises need to start laying the groundwork for new encryption methods.

donald trump

What 2017 has in store for cybersecurity

There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation’s next president will do. Find out what else worries them.

1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

space launch systems

NASA CIO allows HPE contract's authority to operate to expire

In the wake of continued security problems, NASA's CIO is sending a no-confidence signal to Hewlett Packard Enterprise, which received a $2.5 billion contract in 2011 to address problems with the agency's outdated and insecure...

old books

How to improve your incident response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident response plan so to reduce the impact of that data breach.

7 steps to hurricane-ready disaster recovery

When the winds start to howl, hopefully you can take solace that your data is safely backed up many miles away.

01 dbaas title

Top 10 DBaaS security concerns

Survey shows the worries users have of their databases in the cloud.

server cables network switches

How to review and test backup procedures to ensure data restoration

If you want to test backup and restore procedures with your eyes wide open, consider these factors and tips.

architecture

Defense in depth: Stop spending, start consolidating

When it comes to layered defense and security tools, less is often more just as more can sometimes be less. The average enterprise uses 75 security products to secure their network. That's a lot of noise and a lot of monitoring and...

auditor

How an audit can shore up your security strategy

The high-profile data breaches of recent years have forced many organizations to take a closer look at their security technologies and policies, experts say.

electrical grid

Electromagnetic Pulse weapons could knock enterprises offline

No transformers robots, no nukes, just real EMPs from long-range missiles or targeteddDrone attacks.

ted koppel lights out video

Ted Koppel: Apocalypse likely

Retired “Nightline” anchor Ted Koppel, in his new book “Lights Out,” says he is simply documenting the veracity of warnings from top U.S. intelligence officials that the nation’s energy grid is vulnerable to a cyberattack that could...

fbi seal

The FBI isn't wrong; sometimes you will have to pay the ransom

Last week, during the 2015 Cyber Security Summit in Boston, Special Agent Joseph Bonavolonta said that the FBI's advice for some Ransomware attacks is to pay the ransom. Unfortunately, that might be the best option in some cases.

merger

Inherited risk: The downside of mergers and acquisitions

Enterprises going through mergers and acquisitions reap the benefits of new products and other assets, but they also acquire all of the threat vectors that have been targeting the other organization.  

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab.

biometric data

Organizations should focus data sharing post-incident, not attribution

There have been several notable security incidents in the news this year, from healthcare and retail breaches, to financial; even security firms themselves have been targeted. In each instance, attribution seems to take the lead...

00 title
external url

10 tips to make sure you are ready when a disaster strikes

BIAImage by SVIDSHUBStart with a business impact analysis (BIA). This will identify the business's most crucial systems and processes and the effect an outage would have on the business. The greater the potential impact, the more...

black hat logo

InfoSec pros spend most time, money on self-inflicted problems

According to a new survey of Black Hat attendees released last week, InfoSec professionals are spending the biggest amount of their time and budgets on security problems created within the organization itself.

broke

Ponemon: Data breach costs now average $154 per record

According to a report released this morning by IBM and the Ponemon Institute, the per-record cost of a data breach reached $154 this year, up 12 percent from $145 in 2014.

Load More