Advertisement
 
Information Security
Subscribe to Information Security

The Lead

Takeaways on Cyber Security from CIMC 2015

May 21, 2015 10:12 am | by Jenny Chen, Senior Certified Expert IT Consultant, IBM | Blogs | Comments

Jenny Chen, Senior Certified Expert IT Consultant for IBM, discusses her experience at the 2015 Continuity Insights Management Conference, including her takeaways about the state of cyber security and the good, bad and ugly ways in which BC pros deal with it.

US Security Expert Says he Hacked Plane Controls Mid-Flight

May 21, 2015 9:32 am | by Carolyn Thompson, Associated Press | News | Comments

A security researcher told federal agents he was able to hack into aircraft computer systems mid...

Court Awards Some $1.8 Million to Phone Hacking Victims

May 21, 2015 9:10 am | by Associated Press | News | Comments

Britain's High Court has awarded actress Sadie Frost, sports star Paul Gascoigne and a group of...

Romania Turns Hacking Crisis into Advantage, Helping Ukraine

May 14, 2015 10:45 am | by Alison Mutler, Associated Press | News | Comments

Romania, known more for economic disarray than technological prowess, has become one of the...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

State Department Concerned China Behind Cyber Attack on U.S. Sites

May 12, 2015 10:29 am | by Matthew Pennington, Associated Press | News | Comments

State Department spokesman Jeff Rathke's comments follow complaints from anti-online censorship group Greatfire.org that Chinese authorities carried out denial-of-service attacks in late March that intermittently shut down San Francisco-based Github, a U.S.-based computer-code sharing site that hosts some of Greatfire's data. Greatfire.org said it was a direct target of similar attacks earlier that month.

It's All About Restoration, Not Backup! … Or is it?

May 7, 2015 11:28 am | by Joe Starzyk, Senior Business Development Executive, IBM Resiliency Services | Blogs | Comments

Joe Starzyk, Senior Business Development Executive for IBM Resiliency Services, discusses the importance of focusing on data backup, different ways organizations should back their data up and how it can and will lead to faster recovery times in the long run.

Los Angeles Sues Wells Fargo, Alleging Fraud by Employees

May 6, 2015 1:43 pm | by Christopher Weber, Associated Press | News | Comments

Wells Fargo Bank employees driven by strict sales pressure issued unwanted credit cards and opened unauthorized accounts that charged customers fees and damaged their credit, according to a lawsuit filed by the city of Los Angeles.

Advertisement

Keeping an NFL Stadium Secure: ACP Visits Home of Giants, Jets

May 5, 2015 11:33 am | by Joe Shust, Editor | Articles | Comments

On Friday, May 1, members of the Association of Contingency Planners’ Garden State Chapter were given an opportunity to tour MetLife Stadium, home of both the New York Giants and New York Jets, and learn about the ins and outs of how its security team manages the daunting task of keeping tens of thousands safe.

Could Growing Cyber Focus be a Boon for Business Continuity?

May 5, 2015 11:20 am | by Joe Shust, Editor | Blogs | Comments

A new program, co-funded by the National Science Foundation (NSF) and National Security Agency (NSA), is looking to create an interest in cyber security for the next generation. Called GenCyber, the program establishes camps and courses for teenagers that provide instruction about various tech and cyber security topics.  The program is relatively new and sparsely funded at this point, but increasing demand may change that very soon. 

Summer Camps with a Mission: To Create Cyber Security Experts

May 5, 2015 11:13 am | by Wilson Ring, Associated Press | News | Comments

The camps are part of an expanding but modestly funded program called GenCyber that is funded by the National Science Foundation and National Security Agency. The agencies are taking the long view in fulfilling an insatiable need for cyber security experts, both in government and private industry.

A Good Lesson in Continuous Availability

April 30, 2015 11:11 am | by Michael Puldy, IBM | Blogs | Comments

Michael Puldy, Service and Solution Executive for IBM Resiliency Services North America, discusses continuous availability, cyber resilience, protecting your reputation and the importance of effective social media messaging for businesses.

Top Five Plenary Speaker Quotes from CIMC2015

April 28, 2015 11:30 am | by Joe Shust, Editor | Articles | Comments

The 2015 Continuity Insights Management Conference featured sessions by business continuity professionals from every area of the industry, from emergency management to IT/disaster recovery. Here are the top five quotes from our three plenary speakers.

Advertisement

Starbucks Stores Reopen After Computer Glitch

April 27, 2015 11:51 am | News | Comments

 Starbucks was back in business after a computer outage forced thousands of its stores to close early last week.  The glitch affected registers at 7,400 company-operated stores in the U.S. and 1,000 in Canada, and prompted some stores to give away drinks.

O'Dell Discusses Cyber Security to Kick Off CIMC 2015

April 21, 2015 1:15 pm | by Joe Shust, Editor | Articles | Comments

The 2015 Continuity Insights Management Conference got underway Monday, April 20 as Pete O’Dell, founder of Swan Island Networks and author of Cyber 24-7: Risks, Leadership and Sharing, spoke to a capacity crowd about the risks and impacts of cyber attacks.

Researcher Denied Airline Flight after Tweet About Hacking

April 21, 2015 12:30 pm | by Jack Gillum, Associated Press | News | Comments

United Airlines stopped a prominent security researcher from boarding a California-bound flight  following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.  The researcher, Chris Roberts, attempted to board a United flight from Colorado to San Francisco to speak at a major security conference there this week.  

As Data Concerns Grow, Can DRaaS Help Business Continuity Professionals?

April 16, 2015 11:54 am | by Joe Shust, Editor | Articles | Comments

As organizations gather more data and turn to cloud-based solutions to store it, disaster recovery has become an even bigger focus.  Some companies have turned to disaster recovery as a service (DRaaS) solutions in an effort to find a balance between cost efficiency and security.

Anthem Subsidiaries Face Missouri Lawsuit Over Data Breach

April 16, 2015 11:32 am | by Jim Suhr, Associated Press | News | Comments

A lawsuit first filed in February in St. Louis County on behalf of a Richmond, Missouri, woman was amended  to add three plaintiffs who allege personal data stolen during the breach in December or January is responsible for fraudulent tax returns filed in their name, costing them a combined $6,753 in refunds.

Advertisement

Investigators Warn Airplane Computers Could be Hacked

April 16, 2015 11:25 am | by Anne Flaherty, Associated Press | News | Comments

The finding by the Government Accountability Office presents chilling new scenarios for passengers. The report doesn't suggest it would be easy to do, or very likely. But it points out that as airlines and the Federal Aviation Administration attempt to modernize planes and flight tracking with Internet-based technology, attackers have a new vulnerability they could exploit.

NIST Framework Can Help Business Continuity Professionals Prepare for Cyber Attacks

April 14, 2015 11:37 am | by Joe Shust, Editor | Articles | Comments

Serious, targeted cyber attacks are a relatively new threat that have become more and more dangerous as organizations rely more on technology to store their data and operate their business on a day-to-day basis. The National Institute of Standards and Technology (NIST) Framework contains a set of guidelines and best practices to help prevent and defend against cyber attacks.

Hackers Keep Trying New Targets in Search of Easy Data

April 14, 2015 11:03 am | by Brandon Bailey, AP Technology Writer | News | Comments

The health care sector has become the hot target for hackers in recent months, according to researchers at Symantec, a leading cyber security company that says it's also seeing big increases in "spear-phishing," ''ransomware" and efforts to exploit newly discovered vulnerabilities in software used by a wide range of industries.

Companies Need Resources to Stay Up and Running

April 9, 2015 11:44 am | by Joe Shust, Editor | Blogs | Comments

Resource management is something that businesses of all shapes and sizes must deal with on some level almost every day.  Regardless of industry, access to resources is among the most critical things in keeping your business running.  While it may fall to other areas of the organization, BC pros should still have a hand in, or at least be informed about, how their company manages resources.

Australia Judge Disclosing Alleged Internet Pirates' Details

April 7, 2015 11:35 am | by Associated Press | News | Comments

Internet providers lost an Australian court battle to keep secret the names of Internet users suspected of illegally downloading Hollywood movie "Dallas Buyers Club" over file-sharing networks.  The Federal Court ruling is a landmark win for copyright holders in a country which has a reputation for being among of world's most prolific Internet pirates.

Federal Agents Accused of Siphoning more than $1 Million in Bitcoins

April 1, 2015 1:42 pm | by Kristin Bender and Paul Elias, Associated Press | News | Comments

Two former federal agents are accused of using their positions and savvy computer skills to siphon more than $1 million in digital currency from the online black market known as Silk Road while they and their agencies operated an undercover investigation into the website.

Most Personal Information Safe After British Airways Hack

April 1, 2015 12:48 pm | by Scott Mayerowitz, Associated Press | News | Comments

Some British Airways frequent flier accounts have been hacked, but the airline says that most personal information is safe.  The London-based airline did not say how many accounts were compromised, but said they have been locked down and can no longer be accessed.

New Cyber Security Bill Could be Coming Soon

March 25, 2015 4:21 pm | by Ken Dilanian, Associated Press | News | Comments

House intelligence committee leaders unveiled a bipartisan cyber security bill  amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.

Washington Announces Investigation Into Premera Cyber Attack

March 25, 2015 2:51 pm | by Derrick Nunnally, Associated Press | News | Comments

Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and Oregon to look into operations at Premera, which is based in Mountlake Terrace, Washington. The investigation will explore the cyber attack disclosed by Premera last week, in which hackers accessed the personal information of 11 million consumers, including 6 million in Washington, between last May and the exploit's Jan. 29 discovery.  

Twitch Users' Accounts Hacked

March 25, 2015 2:19 pm | by Associated Press | News | Comments

 Amazon.com's video game streaming platform Twitch informed users that their accounts may have been hacked.  Twitch told users that it had taken steps to accelerate the expiration of their passwords and stream keys as a precaution, while disconnecting accounts from Twitter and YouTube.

Hacker Must Disclose Assets to Federal Judge

March 23, 2015 10:19 am | by Martha Bellisle, Associated Press | News | Comments

A Russian man charged with hacking into U.S. businesses to steal thousands of credit card numbers has two weeks to provide a list of all of his assets to a federal judge, who will then decide if he has to pay for his federal public defender.

Testing Delayed After School Computers Were Hacked

March 23, 2015 9:54 am | by Associated Press | News | Comments

Common Core testing for thousands of students had to be delayed after computers were hacked at a Colorado school district, officials said.  School districts in New Jersey and Florida reported similar problems in recent weeks, as the new, computerized assessment tests developed by several states were administered.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading