CISOs poised to continue rise in importance

CISOs (Chief Information Security Officers) at most companies this budgeting season are likely not sweating cuts but are more likely to be concerned with scaling: hiring enough trained cybersecurity staff and deploying the latest defenses and programs. Being prepared to fight off hackers and cyberattacks is a priority for CISOs looking forward to 2020. Hacking [...]

Cyber insurance is gaining popularity, but is it enough?

Cyber attacks are a constant risk, and like other threats such as floods or theft, the insurance industry stands ready to help minimize the risk: behold cyber insurance. While adoption continues to grow, a study by Spiceworks shows that 38 percent of organizations across North America and Europe already have an active policy. It's [...]

Malware infections vary by geography

No place is safe from malware and cyber attacks, but according to a new study, some locations seem to be more likely to suffer from infections. The top three cities in term of rate of infection are Atlanta, Orlando and Denver. Rounding out the top five are St. Louis and Tampa. The study included [...]

(Cyber) incident control

Looking to frame the Uplogix story around cyber resiliency the other day, we came up with a good metaphor: Uplogix works much like the incident control vehicles used by first responders in adverse weather or the all-too-frequent public safety incidents. We’ve all seen these vehicles on TV and a quick web search shows they are [...]

Cybersecurity training for university networks

Cybersecurity training classes were in session at the University of West Florida's Center for Cybersecurity as part of a joint effort between university and state agencies to strengthen the state's preparedness. By providing the government workforce with the latest information and learning resources, the goal of the partnership is to utilize university resources to [...]

Penetration resistance gets too much focus, says NIST

You've heard it here before -- it's not a matter of if, but when. At that point it's less about penetration resistance of trying to keep the bad guys out of your network, but how to minimize the damage and get back up and running. In a second volume to the National Institute of [...]

DDOS attacks growing at a faster rate

DDOS attacks are the most common threat for enterprise, government and educational IT networks, according to an Arbor Networks security report, and to make matters worse, the attacks are getting bigger.  Distributed denial of service attack size grew at a compound annual growth rate of 44 percent from 2005 until 2011. Since then, the rate has [...]

2017 predictions for IT networking & security

Mid-way through the last month of the year means it's time for everyone to release their predictions for IT in the coming year. This year is no different, and given recent headlines about Russian hacking and ransomware designed to let you opt to infect others you know rather than pay up, we're going to talk [...]

Network recovery after the hack

Today we live in a world of "when." And when you're affected by a security breach, you need to think beyond just data protection and backup. You need a clear plan for network recovery after the hack that doesn't rely on the network itself or slow trips to remote sites for "sneaker net" repairs. This [...]

Disaster recovery: Network infrastructure

Today we live in a world of not if, but when. We're not talking about global warming or the presidential election, well not here at least. We're talking about getting hacked. As strong as the efforts are going into cybersecurity and hacking prevention, it's a losing game. Smart people are putting money into thinking about [...]