In a government experiment as officials faced the challenge of housing thousands of displaced people in a densely built and expensive city, officials decided to spend about $500 million sending workers to install boilers, replace electrical panels and make other basic fixes for free so residents could return. Work began three weeks after the Oct. 29 storm.
Six months after a hacker stole the personal data of millions of South Carolina taxpayers, legislators are moving past finger-pointing hearings on who to blame and focusing on how to prevent another massive breach. Meanwhile, the cost to taxpayers continues to climb.
A sheriff says a 911 call about an active shooter at a school in southern Minnesota appears to be a hoax. Scott County Sheriff Kevin Studnicka says students and staff at the middle school, high school and Central Education Campus buildings in New Prague are all safe.
Investigators have yet to pinpoint the culprit behind a synchronized cyberattack in South Korea last week. But in Seoul, the focus is fixed on North Korea, which South Korean security experts say has been training a team of computer-savvy "cyber warriors" as cyberspace becomes a fertile battleground in the nations' rivalry.
The solution, created in partnership with more than 100 SunGard Availability Services' customers, reduces user pain points surrounding operational resiliency and compliance, and instills a sense of confidence in business outcomes for business leaders and business continuity professionals alike.
New York's tentative state budget provides funding for a stockpile of emergency generators so gasoline stations can keep pumping and avoid the shortages and long lines that plagued many downstate areas in the days after Superstorm Sandy.
In an embarrassing twist to a co-ordinated cyberattack on six major South Korean companies this week, investigators said they wrongly identified a Chinese Internet Protocol address as the source. "We were careless in our efforts to double-check and triple-check," KCC official Lee Seung-won told reporters.
xMatters, Inc. has announced enhancements to its mobile capabilities for business continuity and IT management communications. The company’s new Android and enhanced iOS applications build on the recent acquisition of the Bamboo mobile incident management application.
We need to embed recognition of culture into our practices and use that knowledge to improve the appeal and relevance of BCM to our businesses. If you cannot understand why others do not share your passion to establish and maintain a viable continuity capability, you need to read this paper.
A small private aircraft clipped two houses before smashing into a third and snapping in half, killing two people inside the plane and leaking enough jet fuel to force the evacuation of nearby homes in a northern Indiana neighborhood, authorities said.
The Business Continuity Institute (BCI) has released its latest edition of the Good Practice Guidelines. The Good Practice Guidelines (GPG) are the independent body of knowledge for good Business Continuity practice worldwide.
Photos and mementoes that were snatched up and blown hundreds of miles during a Southern tornado outbreak two years ago are giving researchers new insight on how debris is carried by the storms and how it could threaten the public. A new study has documented how one photo traveled nearly 220 miles over Alabama and Tennessee.
More than 10,000 people could die when a monster earthquake and tsunami occur just off the Pacific Northwest coast, researchers told Oregon legislators. When it hits, the report says, many communities will be left without water, power, heat and telephone service.
A wildfire burning in a resort area outside the Great Smoky Mountains National Park in eastern Tennessee has destroyed more than 30 large rental cabins. The 145-acre fire was first reported around 5 p.m. EDT Sunday. Smoke was reported to be visible from 25 miles away.
Bored with classes? Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking. Their goal with "Toaster Wars" is to cultivate the nation's next generation of cyber warriors in offensive and defensive strategies.