Business Continuity

Business Continuity news, information, and how-to advice

taiwan earthquake
nuclear bunkers for sale 1

battle of trenton

Why your security strategy should not be created in a vacuum

Sound strategy supports the core business processes of the organization. It should be (as we often said in the military) a combat multiplier. Meaning it should bolster, strengthen, and galvanize each of the efforts of each business...

bus mistakes thinkstock

5 common mistakes when responding to a security incident

Ben Johnson, chief security strategist at Bit9+Carbon Black, shares some of the most common mistakes security professionals make when responding to an incident.

security policy

Why written policies are vital to your cyber strategy

Policies predefine how our organizations will protect against cyber incidents. They outline the processes that will be used on a daily basis as well as the steps to take when an incident occurs. Essentially, they do all the heavy...

IoT data challenges

Review: 7 data recovery tools for every data disaster

From resurrecting lost photos to recovering RAID arrays, these utilities can bring your data back from the dead

machine learning

Machine learning: Cybersecurity dream-come-true or pipe dream?

Some security experts believe machine learning is a new Holy Grail for cybersecurity. Others dismiss it as over-hyped. The majority say it falls between those extremes, but is closer to the Holy Grail, and could revolutionize...

rewind knob

Top security stories of 2015

Not a shocker to have data breaches lead the way as criminals get ever more devious.

ransom note

Fending off cyber extortion can be difficult

There is a common theme running through many of the recent massive data breaches: cyber extortion. This new trend is gaining popularity on both corporate and individual level. To effectively combat this threat, a good understanding of...

1 communications

What security leaders need to know about breach communication

Leigh Nakanishi shares the approach security leaders need to prepare for their turn to communicate and coordinate during a breach

electrical grid

Electromagnetic Pulse weapons could knock enterprises offline

No transformers robots, no nukes, just real EMPs from long-range missiles or targeteddDrone attacks.

ted koppel lights out video

Ted Koppel: Apocalypse likely

Retired “Nightline” anchor Ted Koppel, in his new book “Lights Out,” says he is simply documenting the veracity of warnings from top U.S. intelligence officials that the nation’s energy grid is vulnerable to a cyberattack that could...

01 title life preserver

14 DRaaS vendors that will rescue you in a pinch

Gartner assesses products ability to help networks recover quickly.

Digital Key

All CoinVault and Bitcryptor ransomware victims can now recover their files for free

Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor, two related ransomware threats.

fbi seal

The FBI isn't wrong; sometimes you will have to pay the ransom

Last week, during the 2015 Cyber Security Summit in Boston, Special Agent Joseph Bonavolonta said that the FBI's advice for some Ransomware attacks is to pay the ransom. Unfortunately, that might be the best option in some cases.

security threat ninja hacker hacked

Spending millions on APT defense? Don’t forget about Third Party Risk Management

Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

01 hurricane joaquin

9 ways to be tech-ready for the next hurricane

With Hurricane Joaquin stirring up high winds and rain off the East Coast, FEMA has released a set of guidelines that might help you stay connected and keep your systems operational once the storm hits.

Chess 122400472

How to create effective cyber strategy

In 60% of reported cases attackers compromise an organization within minutes. Only 25% of those organizations discover the compromise within days or less. 70% of attacks use the initial victim to target a secondary victim. No one is...

merger

Inherited risk: The downside of mergers and acquisitions

Enterprises going through mergers and acquisitions reap the benefits of new products and other assets, but they also acquire all of the threat vectors that have been targeting the other organization.  

internet of things smart house

How to secure the Internet of Things and who should be liable for it?

How to secure connected devices before it will be too late?

Load More