Backup lessons from a cloud-storage disaster

Backup lessons from a cloud-storage disaster

European’s largest cloud provider, OVHcloud, suffered a catastrophic fire last month that destroyed one of its data centers and smoke-damaged a neighboring one. OVHcloud customers with data in the burned-out data cener who had their own disaster recovery measures in place or who purchased the off-site backup and disaster-recovery services offered by OVHcloud have been able to resume operations. Those who did not lost data that will never come back. Some losses were complete, such…

Read More

Data-center outages: Causes are changing, report says

Data-center outages: Causes are changing, report says

A new survey by the Uptime Institute found that power issues are becoming less of a problem for data center operators, but networking and software issues are emerging as an increasingly bigger problem. The Uptime Institute’s third Annual Outage Analysis notes that while improvements have been made with technology and availability, outages remain a major industry, customer, and regulatory concern.  The report also shows that the overall impact and direct and indirect cost of outages…

Read More

Creating a multicloud security architecture: IDG’s CIO Think Tank

Creating a multicloud security architecture: IDG’s CIO Think Tank

CIO | Apr 23, 2021 IDG convened 30 senior IT executives as part of our CIO Think Tank Program to explore key opportunities and challenges with multicloud – including security issues IT leaders face in building a true multicloud architecture. Join us as we shed light on problems voiced by these IT executives, explore how savvy IT shops are crafting a cross-cloud security architecture, and discuss how their strategic vendor partners can help ease the…

Read More

Lockdown Hotel Bookings at Risk Due to DMARC Fail

Lockdown Hotel Bookings at Risk Due to DMARC Fail

Some of the UK’s biggest hotel brands may be exposing themselves and their customers to the risk of phishing attacks due to a lack of adequate messaging security, according to Proofpoint. The security vendor took a look at the primary corporate domains associated with the 60 most popular listed hospitality companies in the country, as ranked by YouGov. It found that half (50%) have no published DMARC (Domain-based Message Authentication, Reporting & Conformance) record. The…

Read More

TLS-Encrypted Malware Volumes Double in Just Months

TLS-Encrypted Malware Volumes Double in Just Months

The volume of malware hidden in encrypted traffic has doubled over the past few months as threat actors look to circumvent security tools, according to Sophos. The security vendor claimed that 23% of the malware it detected in 2020 was encrypted with the Transport Layer Security (TLS) protocol. However, in the first three months of 2021, the figure had grown to reach nearly 46%. The rise can be linked to an overall increase in use…

Read More

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The threat landscape for the water industry

The threat landscape for the water industry

The threat landscape for the water industry | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Product Takeback and Reuse – One Year Later – Cisco Blogs

Product Takeback and Reuse – One Year Later – Cisco Blogs

Reflecting on the nexus of Cisco’s product takeback and reuse program a year and a half after we relaunched it, Cisco VP of Global Distribution Sales Andrew Sage explains, “We wanted to make it as easy for our customers and partners to [send back old equipment] as it is to take recycling to the end of the driveway.” By streamlining and simplifying the customer experience, Cisco has made important progress toward that goal. Let’s take…

Read More

Transform IT for Agility, Innovation, and Growth – Cisco Blogs

Transform IT for Agility, Innovation, and Growth – Cisco Blogs

From the dot-com bust to the global financial crisis, past disruptions have led many businesses to put their digital strategies on the backburner. Organizations that continued to invest in next-generation technologies had an easier time shifting gears to speed ahead. They understood that proactive optimization and continuous transformation are necessary pathways to agility, growth, and innovation. It’s time to transform Fast-forward to 2021. Digital technology is now commonplace in nearly every industry, but organizations are…

Read More
1 3,861 3,862 3,863 3,864 3,865 4,269