Business Continuity / Disaster Recovery cover image

Deborah Bird Haralson and 15 others

Business Continuity / Disaster Recovery

603 Viewers7,342 Page flips123 Followers394 Stories
Photo: www.securityweek.com

Most recent stories in Business Continuity / Disaster Recovery

  • Tom Roepke, Director of Business Continuity at Sony Pictures Entertainment, has no doubt been a very busy man of late.

    With the Sony Pictures hack attack resulting in choice of Sony to pull the movie "The Interview", the absolute smallest possible loss figure is in the 80 million dollar range. This only speaks of the the potential lost revenue, not the approx. 48 million spent to make it, nor the millions in fees payed to the investors on the film. This man-made event constitutes a MAJOR threat to SONY, not only with the loss of this film, but with the loss of privacy related to their emails as well. The content of their emails will cost them in the court of public opinion.

    Avatar
    Official: North Korea behind Sony hack

    Official: North Korea behind Sony hack

    WASHINGTON — Hours after an announcement that U.S. authorities determined North Korea was behind the recent cyber-attack on Sony Pictures, the entertainment company announced it was pulling the film The Interview. The comedy about journalists who score an interview with North Korean dictator Kim Jong …

  • Running an Android device? You’ll have to read this and protect yourself from possible malware. Researchers have found a flaw in the popular Android Operating System by Google that tricks Android users into executing potentially malicious applications by obscuring them inside an innocent image file. The attack leverages the DexClassLoader constructor, which runs it on root in the background. This means that the user will not be able to see the installation happen. The flaw was reportedly fix a while back by Google, but this was an incomplete fix. Watch those file sizes of your images! If they seem out of the norm, it’s best not to open it at all!

    Avatar - John Rodriguez
    Researchers Hide Android Applications in Image Files

    Researchers Hide Android Applications in Image Files

    AMSTERDAM – BLACK HAT EUROPE – Researchers have found a way to trick Android users into executing potentially malicious applications by hiding them …

  • China and the United States are currently in no good terms on the topic of Cyber Security. China says that resuming cyber security cooperation between the two nations is difficult because of “mistaken U.S. practices”. The U.S. is constantly blaming the U.S. government for many cyber-attacks that are believed to be backed by the Chinese Government that has been launched on U.S. companies. Famous whistle-blower Edward Snowden has also mentioned that the NSA also hacks into official network infrastructures of Chinese universities and in Hong Kong. China has used Snowden’s allegations as ammo to point at the U.S. government for hypocrisy.

    Avatar - John Rodriguez
    Reuters | Breaking International News & Views

    Reuters | Breaking International News & Views

    trading lower trading higher trading higher trading higher trading higher trading higher trading higher trading lower October 5, 2024 "Yes they can control the weather," Republican Congress member Marjorie Taylor Greene posted on X. REUTERS/Eduardo Munoz October 5, 2024 The country's worst floods in years …

  • A flaw being utilized by attackers utilizing PowerPoint files contains a malicious Object Linking and Embedding (OLE) object to trigger a new zero-day vulnerability. OLE is utilized to share data between applications. This vulnerability would make it possible to allow remote code execution if a user specially designed Microsoft Office files that contain OLE objects granting the attacker the same user rights as the current user. http://www.csoonline.com/article/2837252/vulnerabilities/microsoft-warns-of-new-zero-day-attack.html

    Avatar - shorey mangum
    shorey mangum
  • Are disaster avoidance and disaster recovery really that different within modern data center? This artical did a good job on explaneing the differnts in which disaster recovery is a price ranges that are generally organization with disruption or data lose while disaster avoidance is to try of preventing the problem with spending more. So when you are working IT you got three ways to make this plan disaster recovery, disaster avoidance, or do both. If you want my suggestion do both no matter where you work.

    Avatar
    Top Federal IT Initiatives Include Security, Disaster Recovery, Digitizing Records

    Top Federal IT Initiatives Include Security, Disaster Recovery, Digitizing Records

    By Christine Kern, contributing writer Recently, Information Week asked its readers to rate more than 30 government IT initiatives in terms of …

  • I would say this artical is "maybe" true as to where most business workers would blame the IT and CEO if their is no backup files to recover their past works. So I think a good way to fix is to try at lest think about problem when making a plan paper.

    Avatar
    The Disaster Recovery Blame Game | CIO Insight

    The Disaster Recovery Blame Game | CIO Insight

    The Disaster Recovery Blame Game Downtime Devastates Productivity 84% of respondents cited employee productivity as the greatest impact of unscheduled …

See more stories
Business Continuity / Disaster Recovery
Magazine

More Magazines by Deborah Bird Haralson