Chris Schin, Vice President of Products for Zetta.net, discusses storage capacity, how it is increasing and the difficulty that causes when backing up data. He discusses using cloud-based storage as a way to alleviate the ever-increasing amount of data most companies are faced with.
China's military hacked into computer networks of...
HealthCare.gov, the health insurance website serving...
Results of the Unitrends and Continuity Insights...
Justice Department officials are seeking a tougher law to combat overseas credit card trafficking, an increasingly lucrative crime that crosses national boundaries. Authorities say the current statute is too weak because it allows people in other countries to avoid prosecution if they stay outside the United States when buying and selling the data and don't pass their illicit business through the U.S.
The federal Office of Personnel Management plans to terminate its massive contracts with USIS, the major security clearance contractor targeted last month by a cyberattack, agency, congressional and company officials say. The computer network intrusion compromised the personal files of as many as 25,000 government workers.
The boundary between the online and physical worlds got blurry last week when Sony's PlayStation Network was disabled by an online attack, while simultaneously an American Airlines passenger jet carrying a Sony executive was diverted due to a bomb threat on Twitter. Experts say that's a wakeup call for a world still coming to grips with cybersecurity: What goes down online can be equally if not more disruptive in the real world.
Atlanta-based home Depot is working with both banks and law enforcement to investigate "unusual activity" that would point to a hack. Hackers have broken security walls for many retailers in recent months, including Target, grocery store chain Supervalu, P.F. Chang's and the thrift store operations of Goodwill.
Ken Simpson discusses the importance of the "cyber supply chain" in preparing for cyber threats and how business continuity and logistics can go hand-in-hand for organizations looking to prevent such threats. He also discusses sharing the critical cyber threats with senior management.
The grocery chain Supervalu said Friday that it may have suffered a data breach at stores in as many as five states. Hackers accessed a network that processes store transactions. Account numbers, expiration dates, cardholders' names and other information may have been stolen, the company said.
Dr. Bill Highleyman, Managing Editor of the Availability Digest, will be presenting a paper on Distributed Denial of Service (DDoS) attacks at the Continuity Insight’s Regional Business Continuity Conference to be held at the Wyndham Hotel in New York City on October 7 and 8, 2014.
For many organizations, the project-based accounting approach, in which departments “buy” datacenter utilization based on specific project needs, is getting out of hand for both IT and the business units it serves. Virtualization should have made project-based IT simple and cost-effective. Instead, the four vCPU minimum required by Microsoft’s SQL Server licensing means history is repeating itself.
Patented seed allegedly stolen from U.S. seed corn companies as part of what prosecutors say was a conspiracy involving seven employees of a Chinese agriculture biotechnology company to steal trade secrets could be worth as much as $500 million, federal prosecutors said last week.
An international law enforcement operation has struck a major blow against the gang behind Shylock, one of the world’s most dangerous financial Trojans. The takedown, which was led by the UK National Crime Agency, resulted in the seizure of a command and control (C&C) servers, in addition to domains that Shylock uses for communication between infected computers.
Nearly 23 million private records of New Yorkers have been exposed in data security breaches reported by more than 3,000 businesses, nonprofits and governments over the past eight years. Deliberate hacking was responsible for 40 percent of the 5,000 incidents.
Authorities say a 30-year old Russian man recently arrested on bank fraud and other charges was also found to have hacked into computers at restaurants in Western Washington, hundreds of other retail businesses and even the Phoenix Zoo.
Steve Ross, Executive Principal for Riskmasters Inc., discusses the importance of being prepared for interruptions caused by cyber attacks and why business continuity professionals should put more effort into planning for such attacks
German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage. The United States and other governments complain China's military, a leader in cyber warfare, steals foreign trade secrets to help the country's vast state-owned industrial sector.
The Houston Astros said Monday that they have been the victims of hackers who accessed their servers and published months of internal trade talks on the Internet. The team is working with the FBI and Major League Baseball security to try who was responsible for the breach.
A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. Nearly 25 percent of consumers changed financial institutions due to dissatisfaction after experiencing fraud.
The United States will urge China to resume discussions on cyber security that were abruptly suspended after the Americans charged five Chinese military officers with hacking into U.S. companies to steal trade secrets. After the indictments against the five officers were unsealed in May, Beijing pulled the plug on the group that had been set up a year ago in what Washington.
Video: All Recoveries are Not Equal:Print and Mail Operations Often Require Additional ConsiderationJune 23, 2014 9:18 am | Videos | Comments
Chris Durfee, Director of Sales and Marketing for MailGard, discusses why some items, like print and mail operations, sometimes require extra consideration during recovery and why not all recovery projects are created equal.
Target Corp. said a glitch in its system caused delays at checkout registers at some of its U.S. stores but it wasn't due to a data security issue or a hacker. Customers across the country took to social media to report long check-out lines Sunday night due to registers not working.
Recent incidents have prompted Kimberly Hirsch, Senior Business Partner with Target Corporation, to leverage remote workplace alternatives in the event of facility outages. Hear her thoughts in this week’s video installment. Stay tuned for next week’s video where Chris Wright with Amgen, emphasizes the importance clear roles and responsibilities during your exercises.
Continuity Insights spoke with Mark Carroll, Senior Vice President and Business Risk Officer at Income Research + Management, to discuss the cloud, its various business applications and some of the risk factors it brings for business continuity professionals.
Avalution Consulting – a leading provider of business continuity consulting and software solutions – announced today the release of the Business Continuity Management (BCM) 101 educational video series. The six videos in BCM 101 provide straightforward answers to the most common business continuity-related questions
A band of hackers implanted viruses on hundreds of thousands of computers around the world, secretly seized customer bank information and stole more than $100 million from businesses and consumers, the Justice Department said Monday in announcing charges against the Russian man accused of masterminding the effort.
The report by China's Internet Media Research Center, cited Tuesday by the official Xinhua News Agency, mentioned media reports of former NSA contractor Edward Snowden's leaks and said a subsequent investigation by Chinese authorities "confirmed the existence of snooping activities directed against China."
"The ruling has significant implications for how we handle takedown requests," Google spokesman Al Verney said. "This is logistically complicated, not least because of the many languages involved and the need for careful review. As soon as we have thought through exactly how this will work, which may take several weeks, we will let our users know."
- Page 1