As organizations gather more data and turn to cloud-based solutions to store it, disaster recovery has become an even bigger focus. Some companies have turned to disaster recovery as a service (DRaaS) solutions in an effort to find a balance between cost efficiency and security.
Serious, targeted cyber attacks are a relatively new threat that have become more and more...
The health care sector has become the hot target for hackers in recent months, according to...
Two former federal agents are accused of using their positions and savvy computer skills to...
Some British Airways frequent flier accounts have been hacked, but the airline says that most personal information is safe. The London-based airline did not say how many accounts were compromised, but said they have been locked down and can no longer be accessed.
House intelligence committee leaders unveiled a bipartisan cyber security bill amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.
Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and Oregon to look into operations at Premera, which is based in Mountlake Terrace, Washington. The investigation will explore the cyber attack disclosed by Premera last week, in which hackers accessed the personal information of 11 million consumers, including 6 million in Washington, between last May and the exploit's Jan. 29 discovery.
A Russian man charged with hacking into U.S. businesses to steal thousands of credit card numbers has two weeks to provide a list of all of his assets to a federal judge, who will then decide if he has to pay for his federal public defender.
Americans are getting older, but not this old: Social Security records show that 6.5 million people in the U.S. have reached the ripe old age of 112. Social Security does not have death records for millions of these people, with the oldest born in 1869, according to a report by the agency's inspector general.
A judge scrapped the Netherlands' data retention law , saying that while it helps solve crimes it also breaches the privacy of telephone and Internet users. The ruling by a judge in The Hague followed a similar decision in April by the European Union's top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.
Internet watchdog group Citizen Lab said in a report that hackers who attacked a U.S. employee of Ethiopian Satellite Television in 2013 have recently launched a new round of attacks using upgraded espionage software. Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs, says the hackers used three booby-trapped emails sent out in November and December.
The Federal Aviation Administration has taken steps to protect the air traffic control system from cyber-based threats, but "significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation," said a report by the Government Accountability Office.
Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.
Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,
The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government. Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.
Cloud computing is an increasingly important IT option for organizations of all sizes. There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture
Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands. Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information.
Sony Corp. trimmed its forecast of losses and gave a figure for damages from the Sony Pictures hack, but said it would suffer no significant harm from the cyberattack in the long run. The entertainment and electronics giant delayed the announcement of its earnings for the October-December quarter because the hack affected its ability to compile its complete results in time.
The ruling at The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years.
Federal prosecutors have obtained a third guilty plea involving an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers. Authorities say 20-year-old Nathan Leroux of Bowie, Maryland, pleaded guilty to conspiracy to commit computer intrusions and criminal copyright infringement.
A Kenyan official says the government is considering a request by the Chinese government to repatriate some of the 76 Chinese nationals arrested in Kenya for hacking. Police arrested the 76 Chinese nationals and one Taiwanese early December with sophisticated equipment in houses in plush neighborhoods of the city.
President, Obama laid out his plans this week as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats. Yet the president's proposals are similar to congressional legislation that has been languishing on Capitol Hill, in part over privacy concerns.
The lawyer for a Russian accused by U.S. authorities of involvement in a huge computer hack that stole and sold at least 160 million credit and debit-card numbers called on a Dutch judge to ban his extradition to the United States. U.S. prosecutors have called the hack the largest data breach scheme ever prosecuted in the United States.
In light of breaches at companies like Home Depot and Target, the president is proposing legislation that would require companies to inform their customers whether their data has been compromised within 30 days called the Personal Data Notification and Protection Act. The act would also make it a crime to sell customers’ identities overseas.
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows high-profile breaches at retailers including Target, Home Depot and Neiman Marcus.
Lori Cunningham, Lead IT Service Management Specialist for Aetna, will present "From Checking-the-Box to Truly Resilient: Case Studies in Disaster Recovery." She will focus on public and private sector case studies that show why having a strong disaster recovery program is important for any organization.
A massive data breach at Sony Pictures Entertainment, which experts believe was targeted by North Korea as retaliation for a film depicting the assassination of its leader Kim Jong Un, has led to an international incident that has gained the attention of business continuity professionals.
South Korea's monopoly nuclear power company said it began drills against possible cyberattacks after online threats of attack against its plants. State-owned Korea Hydro & Nuclear Power Co. said the two-day drills are meant to prepare workers in the event of hacking attacks aimed at disabling the plants' controlling systems.
The unprecedented hack of Sony Pictures which a U.S. official says is linked to North Korea may be the most damaging cyberattack ever inflicted on an American business. The fallout from the hack that exposed a trove of sensitive documents, and this week escalated to threats of terrorism, forced Sony to cancel release of the North Korean spoof movie "The Interview."
- Page 1