Jenny Chen, Senior Certified Expert IT Consultant for IBM, discusses her experience at the 2015 Continuity Insights Management Conference, including her takeaways about the state of cyber security and the good, bad and ugly ways in which BC pros deal with it.
Romania, known more for economic disarray than technological prowess, has become one of the...
State Department spokesman Jeff Rathke's comments follow complaints from anti-online censorship...
Joe Starzyk, Senior Business Development Executive for IBM Resiliency Services, discusses the...
A new program, co-funded by the National Science Foundation (NSF) and National Security Agency (NSA), is looking to create an interest in cyber security for the next generation. Called GenCyber, the program establishes camps and courses for teenagers that provide instruction about various tech and cyber security topics. The program is relatively new and sparsely funded at this point, but increasing demand may change that very soon.
The camps are part of an expanding but modestly funded program called GenCyber that is funded by the National Science Foundation and National Security Agency. The agencies are taking the long view in fulfilling an insatiable need for cyber security experts, both in government and private industry.
Michael Puldy, Service and Solution Executive for IBM Resiliency Services North America, discusses continuous availability, cyber resilience, protecting your reputation and the importance of effective social media messaging for businesses.
The presenters will discuss the many “oops and gotchas” of Disaster Recovery, along with several lessons learned. For example, given the critical importance of email communication, learn how Dell ensures Email Availability and communication regardless of the outage or interruption.
The 2015 Continuity Insights Management Conference featured sessions by business continuity professionals from every area of the industry, from emergency management to IT/disaster recovery. Here are the top five quotes from our three plenary speakers.
Starbucks was back in business after a computer outage forced thousands of its stores to close early last week. The glitch affected registers at 7,400 company-operated stores in the U.S. and 1,000 in Canada, and prompted some stores to give away drinks.
The 2015 Continuity Insights Management Conference got underway Monday, April 20 as Pete O’Dell, founder of Swan Island Networks and author of Cyber 24-7: Risks, Leadership and Sharing, spoke to a capacity crowd about the risks and impacts of cyber attacks.
United Airlines stopped a prominent security researcher from boarding a California-bound flight following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked. The researcher, Chris Roberts, attempted to board a United flight from Colorado to San Francisco to speak at a major security conference there this week.
As organizations gather more data and turn to cloud-based solutions to store it, disaster recovery has become an even bigger focus. Some companies have turned to disaster recovery as a service (DRaaS) solutions in an effort to find a balance between cost efficiency and security.
Serious, targeted cyber attacks are a relatively new threat that have become more and more dangerous as organizations rely more on technology to store their data and operate their business on a day-to-day basis. The National Institute of Standards and Technology (NIST) Framework contains a set of guidelines and best practices to help prevent and defend against cyber attacks.
The health care sector has become the hot target for hackers in recent months, according to researchers at Symantec, a leading cyber security company that says it's also seeing big increases in "spear-phishing," ''ransomware" and efforts to exploit newly discovered vulnerabilities in software used by a wide range of industries.
Two former federal agents are accused of using their positions and savvy computer skills to siphon more than $1 million in digital currency from the online black market known as Silk Road while they and their agencies operated an undercover investigation into the website.
Some British Airways frequent flier accounts have been hacked, but the airline says that most personal information is safe. The London-based airline did not say how many accounts were compromised, but said they have been locked down and can no longer be accessed.
House intelligence committee leaders unveiled a bipartisan cyber security bill amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.
Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and Oregon to look into operations at Premera, which is based in Mountlake Terrace, Washington. The investigation will explore the cyber attack disclosed by Premera last week, in which hackers accessed the personal information of 11 million consumers, including 6 million in Washington, between last May and the exploit's Jan. 29 discovery.
A Russian man charged with hacking into U.S. businesses to steal thousands of credit card numbers has two weeks to provide a list of all of his assets to a federal judge, who will then decide if he has to pay for his federal public defender.
Americans are getting older, but not this old: Social Security records show that 6.5 million people in the U.S. have reached the ripe old age of 112. Social Security does not have death records for millions of these people, with the oldest born in 1869, according to a report by the agency's inspector general.
A judge scrapped the Netherlands' data retention law , saying that while it helps solve crimes it also breaches the privacy of telephone and Internet users. The ruling by a judge in The Hague followed a similar decision in April by the European Union's top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.
Internet watchdog group Citizen Lab said in a report that hackers who attacked a U.S. employee of Ethiopian Satellite Television in 2013 have recently launched a new round of attacks using upgraded espionage software. Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs, says the hackers used three booby-trapped emails sent out in November and December.
The Federal Aviation Administration has taken steps to protect the air traffic control system from cyber-based threats, but "significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation," said a report by the Government Accountability Office.
Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.
Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,
The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government. Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.
Cloud computing is an increasingly important IT option for organizations of all sizes. There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture
Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands. Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information.
- Page 1