Business Continuity
News, Features, and Interviews
News
-
Cryptominers and fileless PowerShell techniques make for a dangerous combo
This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes.
-
The race for quantum-proof cryptography
Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.
-
‘We have to continuously reinvent ourselves’: Oracle ANZ chief Valery Lanovenko
Explains the drivers behind the company’s new mission statement
-
A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet
In-depth research on Russia's Sandworm hacking group shows broad capabilities and scope to disrupt anything in any part of the world.
-
How a bank got hacked
Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank.
-
How much does it cost to launch a cyber attack?
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about.
-
How EDR stops hackers in their tracks
EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behaviour.
-
Equifax data breach FAQ: What happened, who was affected, what was the impact?
In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.
-
Marriott data breach FAQ: How did it happen and what was the impact?
In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers.
-
Silicon Valley goes to the Vatican to talk tech ethics
The gathering is taking place amid the rise of cyber espionage, online hate speech and misuse of private data, and signs the industry is struggling to respond.
Features
Twitter spy scandal a wake-up call for companies to clean up their data access acts
Why local governments are a hot target for cyberattacks
4 must-know facts about secure mobile printing
Is your data being sold on the dark web?
Shadow cloud apps pose unseen risks
In Equifax data breach, three hard lessons in risk
Who is a target for ransomware attacks?
Security budgets continue to grow, but is it enough?
How to avoid being the next Yahoo
How cyber security pros transition to board level decision makers
Case Studies
How to improve your disaster recovery preparedness
Software steers travellers from disaster
Managing unplanned IT outages
Gmail outages shouldn't turn you off SaaS
The complexity of simplifying IT
Strategies for keeping disaster recovery on target
Disaster proof
Simplicity-minded management
The strange case of the disappearing hat: BCP
Return on BCP