Business Continuity

Business Continuity news, information, and how-to advice

donald trump

What 2017 has in store for cybersecurity

There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation’s next president will do. Find out what else worries them.

Stack of school books on desk with an apple on top

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

01 hoho

Tips for maintaining security while employees are out of the office for the holidays

As workers are enjoying time away from the office for the holidays, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security...

2016 software predictions

Yogi Berra was never in the cybersecurity business

It's tough to make predictions, especially about the future. Except one: Your company will get hacked in 2017. Cyberattacks are so common and so discrete that it's virtually a sure thing that hackers will at least probe, and probably...

security disaster recovery

4 top disaster recovery packages compared

There’s arguably no more important IT task than making sure business systems and data can be restored after a disaster. So we asked system administrators to identify the best features — and what’s missing — in four leading software...

solar charger

27% off WakaWaka Solar-Powered Flashlight and Smartphone Charger - Deal Alert

The WakaWaka Power+ is a durable, lightweight and compact solar charger that is capable of charging virtually any type of smartphone or small electronic device within just a few hours, and providing up to 150 hours of safe,...

crystal ball prediction future

2017 security predictions

If you thought 2016 was bad, fasten your seat belts -- next year is going to be even worse.

screen shot 2016 11 28 at 10.07.10 am

21% off Seagate Expansion 8TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

Group of executives holding trophy photo winners people men woman award

Incident response and our 'culture of winning'

Security professionals understand the immense value of a formal incident response plan, but management may not always see it the same way, especially as it may be viewed by stockholders or other interests as a "plan to fail". But...

deals of week thumbnail

Best Deals of the Week, October 24th - October 28th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted.

supply chain

Technology levels the vendor playing field

Gone are the days when the largest vendor in their space was the "right" choice when procuring software. It's time for that viewpoint to change, as the modern age of technology has opened up a world of options for organizations to...

risk complexity tightrope

A better way for security leaders to handle third party risk

Patrick Gorman shares the change in mindset needed to improve how we handle and protect the digital supply chain, third-party risk, and security overall

amazon prime box

Amazon resets customer passwords, while LeakedSource discloses massive update

Last weekend, and continuing on to earlier this week, Amazon sent password reset notifications to customers whose accounts were likely using recycled credentials. In somewhat related news, LeakedSource said on Tuesday they’ve added...

final prep for airborne LTE operations flight

Drones could help with disasters like Hurricane Matthew

Emergency personnel could use 'flying hot spots' to communicate in remote places where wireless antennas were lost or unavailable.

earth explosion

Taking down the internet: possible but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...

Hurricane Matthew

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo.

Cyber security breach attack on monitor with binary code

IT audits must consider the cyber kill chain and much more!

Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to...

07 insider

Anatomy of an insider attack

Planning for insider attacks requires attack path analysis. Using scenarios, like the one in this post, help identify weaknesses.

truck 147912696

Meteors, disasters and the diesel generators

In August of 2003 it was just after 4 pm and I was leaving a vendor event where I was watching a professional tennis match. I was looking forward to the weekend ahead with a light Friday on the schedule. I could not have known how...

servers

Some thoughts on the Krebs situation: Akamai made a painful business call

This weekend Salted Hash is at DerbyCon, and we’ll be posting a few updates from the show, but some recent events have generated buzz, and they’re worth discussing. Namely, Brian Krebs is being censored, and that sets a bad precedent...

Load More