Winning in the IT Service Continuity Management Obstacle Race
In an ideal organisational world, ITSCM (IT service continuity management) guarantees rapid recovery of critical IT services after unplanned downtime.
The Rise and Rise of the Recovery Consistency Objective
Timing, as comedians say, is everything. It’s true if you’re on stage entertaining an audience.
Our 2015 Business Continuity Review – Cloudy with Scattered Security Breaches
Information security, both in-cloud and on-premise, was somewhat higher profile during 2015. The top three threats for the year for cloud environments were (in decreasing order of importance) app attacks, suspicious activity, and brute force.
IT Security Trends in Technology, Politics and People – Always Two Sides to the Coin
With mobile computing already so widespread and the promise to add billions more attached devices, a large part of your security will be determined by the state of your technology.
Why You Should Keep Doing IT Penetration Testing
If the business and IT environment fluctuates so much, why then is it still important to do penetration testing?
IT Network Firewall Technology is a Model for Business Continuity Too
Instead of (or as well as) trying to sneak past a firewall with a few innocent-looking data packets, the DOS attack tries to cripple a network