Business Continuity

Business Continuity news, information, and how-to advice

cloud tools
st louis federal reserve bank

healthcare security hp

CareFirst data breach affects 1.1 million people

On Wednesday, CareFirst BlueCross BlueShield (CareFirst) disclosed a data breach that impacts 1.1 million current and former members. Within the next three weeks, CareFirst will be notifying 1.1 million people in Maryland, the...

amtrak derailment

Business continuity and disaster recovery planning: The basics

Good business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, supply chain problems and more.

egret mirror image

DDoS reflection attacks are back – and this time, it's personal

This time, instead of hitting data center servers or DNS servers, the attackers are going after personal computers on misconfigured home networks.

american justice courtroom gavel legal system law justice flag 000000804982

Law firm says human error to blame for client breaches in 2014

The Privacy and Data Protection team at BakerHostetler, a law firm with offices across the U.S, has released a report stating that human error was responsible for the majority of the security incident cases they worked in 2014.

keyboard chinese flag china hacker

Penn State disables network after attack, says China is to blame

The Penn State College of Engineering took their network offline on Friday, after being targeted by what the school is calling two "sophisticated" cyber attacks. The university engaged FireEye to help with incident response, and...

mobile payments

Five tips to comply with the new PCI requirements

At the end of June, merchants that accept payment cards have five new security requirements to comply with -- and significant fines and other costs if they don't

ecommerce thinkstock

Criminals attempt 25 million payments and logins a month

During the last quarter of 2014 and the first quarter of 2015, 4 percent of all attempts to create new online accounts were definitely illegitimate, as were 2.3 percent of all account logins, and 3.2 percent of all payment attempts.

cracks in wall

SAFETY Act liability shield starts showing cracks

This week, Salted Hash has examined the Department of Homeland Security's (DHS) SAFETY Act, and FireEye's promise to customers that their certification under the act provides them protection from lawsuits or claims alleging that the...

security protection defending shield soldier battle warrior

FireEye offers new details on customer liability shields under the SAFETY Act

On Friday, Salted Hash explored the announcement from FireEye that their customers now have a liability shield due to being certified by the Department of Homeland Security (DHS) under the SAFETY Act. Now the company has released...

security protection defending shield soldier battle warrior

FireEye customers get liability shield thanks to SAFETY Act

Last week, the Department of Homeland Security (DHS) certified FireEye under the SAFETY Act, providing their customers protection from lawsuits or claims alleging that the products failed to prevent an act of cyber-terrorism.

nepal earthquake

Ham radio attempts to fill communication gaps in Nepal rescue effort

Solar and battery-powered amateur radios can run even during power outages

tesla supercharger station tesla model s resized

Tesla attack started with a single phone call

Last weekend, Tesla Motors had their website, and Twitter accounts hijacked by individuals looking to play a joke. They used their access to deface the company's website and spam a computer repair shop in Illinois, posting their...

zombie dude

Zombie apps haunt BYOD workplaces

According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no longer supported.

rsa moscone south

166816 (Z66816): A post-RSA Conference recap

Default credentials: Ignored by those who should be paying attention, and collected by everyone else, they're the reason most breaches don't need to be too technical.

presentation boardroom

Are you prepared to make an impact in the boardroom as a security leader?

You can make an impact in the boardroom if you prepare yourself first. Kevin West of K logix shares three ways for security leaders to get started.

paper bomb

Senator wants bomb-making information removed from the Internet

Feinstein calls for al-Qaeda's Inspire Magazine and the Anarachist Cookbook to be censored

ssl secure browser security lock

Wider use of HTTPS could have prevented attack against GitHub

The unique attack method used to disrupt the code-sharing site GitHub over the last week could have been prevented if more websites enabled encryption, the Electronic Frontier Foundation (EFF) said Wednesday.

teenagers taking pizza slices at restaurant 78742347

Pizza restaurant targeted for supporting Indiana's 'religious freedom' law

They were the first restaurant owners in Indiana to come out in support of Indiana's controversial "religious freedom" bill, signed into law last week by Governor Mike Pence. However, the O'Connor family and their business, Memories...

Load More