Business Continuity

Business Continuity news, information, and how-to advice

business video ts
ashley madison

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab.

ashley madison

Ashley Madison hack linked to suicide, spam, and public outrage

It's been a week since the hackers behind the Ashley Madison hack, a group known only as Impact Team, leaked nearly 30GBs worth of files, followed quickly by another 40GBs in two separate releases, containing application source code...

ashley madison

Ashley Madison self-assessments highlight security fears and failures

Last June, executives and business leaders at Avid Life Media (ALM) responded to an internal Q&A addressing their strengths and fears. This assessment was leaked as part of the documents released by Impact Team this week, and offers a...

overstimulated

Threat intelligence needs to grow up

Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged...

false identity

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc in its SEC filings reveal they were the victim of a social engineering attack resulting in the loss of $39 million

ICANN website security breached

On foot of a security breach to its website, ICANN has requested that users reset their passwords

blackhatusa

Black Hat 2015: Salted Hash live blog (Day 1)

Targeted attacks and social engineering are the top two concerns for Black Hat attendees, according to a recently published study based on responses from nearly 500 working InfoSec professionals.

biometric data ts

Organizations should focus data sharing post-incident, not attribution

There have been several notable security incidents in the news this year, from healthcare and retail breaches, to financial; even security firms themselves have been targeted. In each instance, attribution seems to take the lead...

00 title

10 tips to make sure you are ready when a disaster strikes

Here are 10 absolute basics your Business Impact Analysis plan should cover

rbs

DDoS Attacks Take Down RBS, Ulster Bank, and Natwest Online Systems

Customers of the RBS group of banks were unable to access their online accounts due to a 50 minute DDoS attack

rfid cards

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.

black hat logo

InfoSec pros spend most time, money on self-inflicted problems

According to a new survey of Black Hat attendees released last week, InfoSec professionals are spending the biggest amount of their time and budgets on security problems created within the organization itself.

office of personnel management

FBI alert discloses malware tied to the OPM and Anthem attacks

The breach at the Office of Personnel Management (OPM) is still the leading security incident in the news. Just last week the public learned that the breach might impact up to 32 million people and earlier this month, the FBI released...

Agencies need to pay more attention to supply chain security

Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result.

Trees are stripped of bark 30 feet above the river, showing the peak of the flash flood

Incident response lessons from the Texas flash flood

During the overnight hours of Saturday night and Sunday morning May 23-24, heavy rain in the Texas Hill Country triggered a flash flood of near-Biblical proportions in Wimberley and San Marcos. This is the story of a disaster response...

home security

20-plus tips on securing your home like a pro

We picked the brains of home-security professionals to learn which devices and tactics deliver the most bang for the buck.

saudi embassy berlin

Leaked Saudi emails reveal new victim of Iranian hackers

Documents published by WikiLeaks, sourced from the Saudi government, have revealed the country's Ministry of Foreign Affairs (MOFA) as a victim of the series of attacks in 2014 collectively called Operation Cleaver.

Indianapolis 148492252

CircleCityCon: Protecting the supply chain

On Saturday, during an early morning session at CircleCityCon in Indianapolis, Akamai's Dave Lewis addressed the topic of supply chain security with the conference's early risers.

Load More