Monster snow: How Buffalo-area businesses kept things going in the storm
Despite the warnings of heavy snow, David Thiemecke's company Algonquin Studios was involved with an event last week to talk about the growth of hacking. With a party-like atmosphere, which included a...
View ArticleReport: Most companies fail at keeping track of patches, sensitive data
The majority of businesses don't have a solid system for tracking sensitive data, or a mature patch management process, according to new survey of IT professionals released by Trustwave.
View ArticleHackers hint at terror attacks, release more data from Sony Pictures
The group responsible for the attack on Sony Pictures, the GOP (Guardians of Peace), has moved away from their normal rhetoric, issuing a thinly veiled threat of terror attacks on Christmas Day; the...
View ArticleU.S. CENTCOM Twitter feed compromised by 'Cyber Jihadists'
The official Twitter account for the U.S. Central Command (CENTCOM) was compromised Monday afternoon, by attackers claiming to support the terrorist group ISIS.
View ArticleHow to create an effective data security communication plan
In today's global office, IT security leadership spends a great deal of time and resources creating a defense-in-depth approach to data security. This often includes layering on both logical and...
View ArticleGoDaddy accounts vulnerable to social engineering and Photoshop
On Tuesday, my personal account at GoDaddy was compromised. I knew it was coming, but considering the layered account protections used by the world's largest domain registrar, I didn't think my...
View ArticleDDoS reflection attacks are back -- and this time, it's personal
At the start of 2014, attackers' favorite distributed denial of service attack strategy was to send messages to misconfigured servers with a spoofed return address -- the servers would keep trying to...
View ArticleBusiness continuity and disaster recovery planning: The basics
Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—whether those events might include a hurricane or simply a power outage caused by...
View ArticleFBI alert discloses malware tied to the OPM and Anthem attacks
The security problems over at the Office of Personnel Management (OPM) are still the leading story in the news lately.
View ArticleWithout information security processes, you are flying blind
The aim of the Security Analogies Project is to help spread the message of information security and its importance in the modern world.
View ArticleVARs partnering on technological security skills gap but social skills gap...
Value-added resellers (VARs) across Australia and New Zealand are struggling to obtain adequate security skills, according to recent findings from industry organisation CompTIA, and most are looking to...
View ArticleZertocon 2017- Pronto makes the move to the cloud and DRaaS
Pronto Software is an Australian ERP software developer and vendor. The original company has been in the software business for over 40 years.
View ArticleIn Pictures: ZertoCON 2017 Sydney
ZertoCON 2017 - The epicenter of the Business Continuity and IT Resilience world — in the hub of technology, culture and history that is Australia. It’s where BC/DR and hybrid cloud strategists meet...
View ArticleIt’s time to future-proof emailing archiving. Here’s why
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
View ArticleThe last quarter of 2018 saw more Australian data breaches than ever
Years of investment in security have failed to stem the number of data breaches affecting Australian companies, with new figures bringing to 812 the number of compromises reported since the notifiable...
View Article
More Pages to Explore .....