Business Continuity

Business Continuity news, information, and how-to advice

computer chip circuit board technology electrical equipment mother board processor engineering 0000
Ebola virus and electronic medical records

screen shot 2014 10 16 at 8.37.50 pm

Here's a bird’s eye view of Ebola epidemic

Data-publishing platform Silk has created a world map depicting the spread of the Ebola epidemic worldwide.

serverskulls header

Amateur cries wolf and says KrebsOnSecurity was hacked

Over the weekend, a self-made "hacker" who goes by the handle N4rCochaos claimed that he had hacked one of the Web's most visible security journalists, Brian Krebs. According to his claims, he hacked KrebsOnSecurity.com and obtained a...

yahoo sign

Yahoo says they're patching servers compromised by Shellshock

Jonathan Hall, of Future South Technologies, said that he uncovered a botnet running on two Yahoo servers, managed by a group of hackers out of Romania. Yahoo has confirmed the incident, and said they are working to resolve the issue....

Three steps you need to take to avoid overreacting to the bash bug

The steps necessary to be effective in the wake of the frenzy with an executive plan of action that explains and brings others into the response while protecting the business.

ebay sign

Is eBay trading too much security for seller happiness?

Criminals are exploiting an eBay security weakness that could result in shoppers getting redirected to a malicious webpage that tries to steal bank account information.

ss apple iphone evolution carousel 100412891 orig

Here are the limits of Apple's iOS 8 privacy features

The privacy improvements in the latest version of Apple's mobile operating system provide necessary, but limited, protection to customers, experts say.

boardroom meeting

Addressing security with the board: Tips for both sides of the table

In the boardroom, when it comes to addressing the topic of security, there's tension on both sides of the table. It doesn't happen all the time, but when it does, the cause of the friction is usually security executives and board...

Train security

Tunnel vision: Train security as critical as planes and automobiles

Railroads have historically considered their computing, controls and communications to be proprietary, and therefore more secure. With today’s use of commercial off-the-shelf products and standard protocols, yesterday’s defenses for...

goodwillcap

Goodwill payment systems compromised

Just when you might have thought there wasn’t anymore staying power in the parade of stories about point of sale systems being hacked we find that even Goodwill isn’t immune. Last week the organization confirmed that their...

home depot

New details suggest that Home Depot breach is nationwide

New information suggests that the Home Depot breach may extend to all 2,200 stores. Comparing the ZIP codes from the stolen cards available online to the ZIP codes associated with the improvements retailer, there is a 99 percent...

binary hard drive

Feds probing possible hacking incident at JP Morgan Chase

On Wednesday, Bloomberg reported that the FBI, the US Secret Service, and even the NSA are investigating an incident alleged to have occurred in mid-August on JP Morgan Chase's (JPMC) network.

Why our lack of understanding on China may be the biggest risk

While China’s ability to wage cyber warfare is sure, the real risk to the U.S. may be its lack of understanding the eastern nation.

vibrams

Vibram suffered five finger data breach

Vibrams hosting provider hacked.

erp

ERP: Protecting the pipeline by focusing on business-critical platforms

In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners in order to target chain resources. So what can organizations do about this type of threat, when they're...

blackhat2013

Black Hat 2014: The challenge of securing embedded devices and IoT on display

Industry doesn’t yet fully realize extent of subversion possible through IoT security, researchers say.

blackhatlogo

Salted Hash: Live from Black Hat USA (Day 0)

Salted Hash is on the road this week. All week long, the blog will be updated with news, and various tidbits from Black Hat USA, B-Sides Las Vegas, and DEF CON 22.

Are you immune from this very real risk to your tenure as CSO?

As we work to adjust our bias for breach prevention, the real concern is how the response is handled. Some steps to help ensure you get it right.

credit card reader

Nearly 600 business impacted by POS malware attack

The United States Secret Service, working with Trustwave, has discovered a series of attacks in the retail sector, which uses customized malware to infect POS systems. The crime itself isn't overly technical, as the criminals behind...

Load More