The federal personnel agency whose records were plundered by hackers linked to China says it has temporarily shut down a massive database used to update and store background investigation records. The agency says a newly discovered flaw left the system vulnerable to hackers.
It has been an interesting couple of weeks in the realm of cyber security, particularly for...
The federal government has for years failed to take basic steps to protect its data from hackers...
The head of the government agency that suffered two massive cyber attacks said a hacker gained...
Tensions between the U.S. and China are growing over its island-building in the South China Sea and over suspicions that Beijing was behind a massive hack into a federal government server that resulted in the theft of personnel and security clearance records of 14 million employees and contractors.
The St. Louis Cardinals have been the toast of their Midwestern city for generations, a source of civic pride as one of baseball's most successful and cherished franchises. Suddenly, they're an embarrassment, under federal investigation for allegedly hacking into the computer database of an opponent, the Houston Astros, whose general manager, Jeff Luhnow, is a former Cardinals executive.
It’s not often that sports are discussed in the business continuity community, especially with so many of its members working with large, multi-national firms. However, a recent high profile data breach involving two Major League Baseball teams is worth watching.
The agency that allowed hackers linked to China to steal private information about nearly every federal employee — and detailed personal histories of military and intelligence workers with security clearances — failed for years to take basic steps to secure its computer networks, officials acknowledged to Congress.
Federal law enforcement authorities are investigating whether the Cardinals illegally accessed a computer database of the Houston Astros. The aim was obtaining information from a front office headed by a former top aide who helped transform St. Louis' scouting operation to a sabermetrics-based system, a person familiar with the situation told The Associated Press.
A government data warehouse that stores information indefinitely on millions of HealthCare.gov customers is raising privacy concerns at a time when major breaches have become distressingly common. Known as MIDAS, the system is described on a federal website as the "perpetual central repository" for information collected under President Barack Obama's health care law.
Pete O'Dell, Founder of Swan Island Networks, discusses how companies can continue to operate after a data breach and why it is critical for continuity and eventual recovery from cyber attacks. This is the second in a two part series of videos.
Pete O'Dell, Founder of Swan Island Networks, discusses the potential for cyber attacks, why companies often fall victim to those attacks and what they can do to detect and prevent them. This will be the first in a two part series of videos.
An immense hack of millions of government personnel files is being treated as the work of foreign spies who could use the information to fake their way into more-secure computers and plunder U.S. secrets. Federal employees were told in a video to change all their passwords, put fraud alerts on their credit reports and watch for attempts by foreign intelligence services to exploit them.
Authorities are still investigating a hack that led to the theft of personal information from more than 100,000 taxpayers at the Internal Revenue Service (IRS). This isn’t the first time the IRS, or any government institution, has been hacked, but each time it happens it seems to renew the discussion on the importance of cyber security.
Jenny Chen, Senior Certified Expert IT Consultant for IBM, discusses her experience at the 2015 Continuity Insights Management Conference, including her takeaways about the state of cyber security and the good, bad and ugly ways in which BC pros deal with it.
Romania, known more for economic disarray than technological prowess, has become one of the leading nations in Europe in the fight against hacking. The reason: the country's own battle against Internet renegades and a legacy of computing excellence stemming from Communist dictator Nicolae Ceausescu's regime.
State Department spokesman Jeff Rathke's comments follow complaints from anti-online censorship group Greatfire.org that Chinese authorities carried out denial-of-service attacks in late March that intermittently shut down San Francisco-based Github, a U.S.-based computer-code sharing site that hosts some of Greatfire's data. Greatfire.org said it was a direct target of similar attacks earlier that month.
Joe Starzyk, Senior Business Development Executive for IBM Resiliency Services, discusses the importance of focusing on data backup, different ways organizations should back their data up and how it can and will lead to faster recovery times in the long run.
A new program, co-funded by the National Science Foundation (NSF) and National Security Agency (NSA), is looking to create an interest in cyber security for the next generation. Called GenCyber, the program establishes camps and courses for teenagers that provide instruction about various tech and cyber security topics. The program is relatively new and sparsely funded at this point, but increasing demand may change that very soon.
The camps are part of an expanding but modestly funded program called GenCyber that is funded by the National Science Foundation and National Security Agency. The agencies are taking the long view in fulfilling an insatiable need for cyber security experts, both in government and private industry.
Michael Puldy, Service and Solution Executive for IBM Resiliency Services North America, discusses continuous availability, cyber resilience, protecting your reputation and the importance of effective social media messaging for businesses.
The presenters will discuss the many “oops and gotchas” of Disaster Recovery, along with several lessons learned. For example, given the critical importance of email communication, learn how Dell ensures Email Availability and communication regardless of the outage or interruption.
The 2015 Continuity Insights Management Conference featured sessions by business continuity professionals from every area of the industry, from emergency management to IT/disaster recovery. Here are the top five quotes from our three plenary speakers.
Starbucks was back in business after a computer outage forced thousands of its stores to close early last week. The glitch affected registers at 7,400 company-operated stores in the U.S. and 1,000 in Canada, and prompted some stores to give away drinks.
The 2015 Continuity Insights Management Conference got underway Monday, April 20 as Pete O’Dell, founder of Swan Island Networks and author of Cyber 24-7: Risks, Leadership and Sharing, spoke to a capacity crowd about the risks and impacts of cyber attacks.
United Airlines stopped a prominent security researcher from boarding a California-bound flight following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked. The researcher, Chris Roberts, attempted to board a United flight from Colorado to San Francisco to speak at a major security conference there this week.
As organizations gather more data and turn to cloud-based solutions to store it, disaster recovery has become an even bigger focus. Some companies have turned to disaster recovery as a service (DRaaS) solutions in an effort to find a balance between cost efficiency and security.
Serious, targeted cyber attacks are a relatively new threat that have become more and more dangerous as organizations rely more on technology to store their data and operate their business on a day-to-day basis. The National Institute of Standards and Technology (NIST) Framework contains a set of guidelines and best practices to help prevent and defend against cyber attacks.
The health care sector has become the hot target for hackers in recent months, according to researchers at Symantec, a leading cyber security company that says it's also seeing big increases in "spear-phishing," ''ransomware" and efforts to exploit newly discovered vulnerabilities in software used by a wide range of industries.
- Page 1