Disaster Recovery

Disaster Recovery news, analysis, research, how-to, opinion, and video.

taiwan earthquake
nuclear bunkers for sale 1

battle of trenton

Why your security strategy should not be created in a vacuum

Sound strategy supports the core business processes of the organization. It should be (as we often said in the military) a combat multiplier. Meaning it should bolster, strengthen, and galvanize each of the efforts of each business...

bus mistakes thinkstock

5 common mistakes when responding to a security incident

Ben Johnson, chief security strategist at Bit9+Carbon Black, shares some of the most common mistakes security professionals make when responding to an incident.

security policy

Why written policies are vital to your cyber strategy

Policies predefine how our organizations will protect against cyber incidents. They outline the processes that will be used on a daily basis as well as the steps to take when an incident occurs. Essentially, they do all the heavy...

IoT data challenges

Review: 7 data recovery tools for every data disaster

From resurrecting lost photos to recovering RAID arrays, these utilities can bring your data back from the dead

rewind knob

Top security stories of 2015

Not a shocker to have data breaches lead the way as criminals get ever more devious.

1 communications

What security leaders need to know about breach communication

Leigh Nakanishi shares the approach security leaders need to prepare for their turn to communicate and coordinate during a breach

electrical grid

Electromagnetic Pulse weapons could knock enterprises offline

No transformers robots, no nukes, just real EMPs from long-range missiles or targeteddDrone attacks.

ted koppel lights out video

Ted Koppel: Apocalypse likely

Retired “Nightline” anchor Ted Koppel, in his new book “Lights Out,” says he is simply documenting the veracity of warnings from top U.S. intelligence officials that the nation’s energy grid is vulnerable to a cyberattack that could...

01 title life preserver

14 DRaaS vendors that will rescue you in a pinch

Gartner assesses products ability to help networks recover quickly.

Digital Key

All CoinVault and Bitcryptor ransomware victims can now recover their files for free

Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor, two related ransomware threats.

fbi seal

The FBI isn't wrong; sometimes you will have to pay the ransom

Last week, during the 2015 Cyber Security Summit in Boston, Special Agent Joseph Bonavolonta said that the FBI's advice for some Ransomware attacks is to pay the ransom. Unfortunately, that might be the best option in some cases.

01 hurricane joaquin

9 ways to be tech-ready for the next hurricane

With Hurricane Joaquin stirring up high winds and rain off the East Coast, FEMA has released a set of guidelines that might help you stay connected and keep your systems operational once the storm hits.

chip and pin credit card

How to detect credit card theft in the early moments

A single email helped prevent thousands in fraudulent credit card transactions. This isn't a special trick, it's a service most financial institutions offer, but it's only useful if you enable it.

img 0392

The disaster-recovery lessons we learned after Katrina

The destruction of the hurricane itself, and the subsequent flooding that put most of New Orleans underwater knocked many businesses out of commission—and more than a few completely out of existence. Thankfully, we have learned a lot...

noel biderman

Ashley Madison CEO quits, company says they're adjusting to breach

Noel Biderman, the CEO of Avid Life Media, resigned on Friday, weeks after a group calling itself Impact Team published compromised data, including details on more than 30 million Ashley Madison account holders.

business video ts

The incident response plan you never knew you had

By leveraging important elements of the existing business continuity plan (BCP) and resources, the security team can jump start the computer incident response plan (CIRP) and obtain a faster and more responsive organization.

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab.

overstimulated

Threat intelligence needs to grow up

Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged...

Load More