NOMINATIONS NOW OPEN

Business Continuity News, Features, and Interviews

News

Machine learning enabling whole-of-data-centre security analysis: Cisco

Complex interdependencies between applications and computing environments can make whitelist-based security nearly impossible to enforce in practice, a Cisco executive has argued as the company debuts a data-centre analytics platform that utilises machine-learning techniques to model and predict the security impact of configuration and application changes.

David Braue | 22 Jun | Read more

More Business Continuity news

Reviews

Secure cloud backup : Review

To help you narrow down your options, here's our take on some of the more popular and well-known services, as well as some you may not have heard of. Use these as a springboard—again, there are plenty of other options out there—for your own research, and if you're not currently using a cloud backup service you may find reason to once you've seen what's on offer.

Ashton Mills | 30 Apr | Read more

Review: Self-Encrypting External Hard Disk Drives

With data becoming more valuable, the need for security also gets greater. Today’s technology and working behaviours both facilitate data being easily transported. Information is far less static due to home working, multiple office sites, low cost USB storage devices and DVDs. With all these portable devices and data being moved from place to place we must be mindful of data backup.

Enex Testlab | 16 Oct | Read more

More Business Continuity reviews

Slideshows

More Business Continuity slideshows

Features

Opinion:Random Hacks of Kindness (RHoK) Melbourne – an extraordinary collaboration for good

A marathon hack event held over a June weekend in Melbourne attracted more than 50 developers and designers, and a dozen subject matter and technical experts to ‘hack for humanity’. They volunteered their time to create open source solutions for communities impacted by natural disasters and climate change. These prototypes are available to assist in disaster relief planning, emergency management and community recovery.

Jane Treadwell | 14 Jul | Read more

More Business Continuity features

Opinions

Cyberwar Incident Response at the Speed of Thought

In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.

Nick Race | 12 Apr | Read more

Role-based Access Control: Access, security, info tracking

Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many organizations, and relating all this data to the user’s account information in Active Directory can be tricky and time consuming.

Dean Wiech | 06 Apr | Read more

More Business Continuity opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place