business continuity

Restaurant fills DR gap with all-flash Pure and dodges higher cloud cost

US restaurant chain Red Lobster opted to standardise on Pure Storage flash storage arrays as it tried to fill a gap in disaster recovery (DR) provision that would have left it severely exposed in case of an unplanned outage at its primary datacentre. The move to fully on-premise mirrored datacentres also meant it dodged cloud…

Restaurant fills DR gap with all-flash Pure and dodges higher cloud cost Read More »

M&S, Co-op attacks a ‘Category 2 cyber hurricane’, say UK experts

The Scattered Spider/Dragonforce cyber attacks that struck Marks & Spencer and Co-op during the spring have been classed as a Category 2 cyber event on the UK Cyber Monitoring Centre’s (CMC’s) recently launched ‘hurricane scale’, with total costs likely to end up somewhere between £270m and £440m. The CMC – an arm’s-length body set up…

M&S, Co-op attacks a ‘Category 2 cyber hurricane’, say UK experts Read More »

Where IT comes from: Pure Storage’s lean Czech assembly

As with Pure Storage’s research and development (R&D) efforts, its final product assembly also rests on a three-site system. Flash arrays put together at regional sites – two in Texas and one in Czechia – cater for regional demand. We visited its European assembly location in Pardubice, Czechia, to see how it works. Pure occupies…

Where IT comes from: Pure Storage’s lean Czech assembly Read More »

Backup technology explained: The fundamentals of enterprise backup

Backup is a fundamental protection required by any IT system. That’s all the more so in a world where ransomware attacks can take out company data in a stroke. Effective backup has also become more complex as IT departments deal with a variety of systems – including virtual servers and desktops, and containerised applications –…

Backup technology explained: The fundamentals of enterprise backup Read More »

The most pressing challenges for CISOs and cyber security teams

The UK Ministry of Defence recently published its Global Strategic Trends report which sets out the developments that will shape the world over the next five years. These provide an insight into some of the challenges that CISOs and cyber security teams will face.The first threat is that of global and regional political instability. As…

The most pressing challenges for CISOs and cyber security teams Read More »

Six trends that will define cyber through to 2030

Guessing the future is always a difficult task. Six trends for the next five years seem more apparent than others, and it will be interesting to re-read this article in 2029 to assess its accuracy. In the meantime, the six trends standing out as top priorities, in no particular order, are: Preparing the post-quantum cryptographic…

Six trends that will define cyber through to 2030 Read More »

Blue Yonder ransomware attack breaks systems at UK retailers

A ransomware attack on the systems of Blue Yonder, a specialist supply chain management software provider based in the US, continues to cause knock-on impacts to the systems of multiple UK-based retailers, including major supermarkets. The attack unfolded prior to the weekend of 23 and 24 November, and impacted the organisation’s managed services hosted environment.…

Blue Yonder ransomware attack breaks systems at UK retailers Read More »

Further disruption expected after latest NHS cyber attack

Merseyside residents are facing a third day of significant disruption to healthcare services in the area, following a major cyber attack on Wirral University Teaching Hospitals NHS Foundation Trust. The cyber attack, which initially came to light on Monday 25 November, is believed to have affected all clinical activity at multiple sites including Arrowe Park…

Further disruption expected after latest NHS cyber attack Read More »

Cyber firms need to centre their own resilience

Information security is essentially an information risk management discipline. By rendering many information systems inoperable, the global outage precipitated by Crowdstrike prevented several companies from accessing critical business information due to unplanned and extended downtime. The unavailability was not only to information systems, but also to related information processing. It was not only an information…

Cyber firms need to centre their own resilience Read More »

World’s largest companies at near-universal risk of supply chain breach

Out of the world’s 2,000 largest companies, 1,980 have a direct connection to a technology supplier that has experienced a recent cyber security incident or data breach, highlighting escalating risk levels to the global economy presented by multi-party supply chain attacks. In research released to mark the opening day of the annual Black Hat security…

World’s largest companies at near-universal risk of supply chain breach Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top