Computers, networks, and information security seem to fall comfortably under the heading of science, but science alone is not enough. Security system developer Tripwire recently conducted a survey in cooperation with the Ponemon Institute to find out whether IT professionals consider risk management to be “science” or “art."
Ponemon surveyed 1,320 respondents across the United States and the United Kingdom: IT professionals working in information security, risk management, IT operations, business operations, and compliance. Participants were asked, “In your opinion, is information security risk management an ‘art’ or ‘science’?”
Ponemon defined the two concepts for the purposes of the survey. “Science” means basing decisions on objective, quantifiable metrics and data. “Art” refers to analysis and decisions that are based on intuition, expertise, and a holistic view of the organization.
Can summer heat cause as big a disaster as a hurricane or tornado? We turned to backup and disaster recovery specialist and MSP Strata Information Technology, Inc to find out. President Pete Robbins follows three simple procedures to keep customers in check during the summer heat. We'll reveal the scoop in this MSPmentor exclusive.
Robbins suggested to MSPmentor that even MSPs located in an area that is less likely to be hit by a natural disaster, it's still important to stay focused and energized.
Today’s virtualized systems provide a sound platform for business continuity because the platforms and networking are stronger and more agile than they were even a few years ago.
One of the key benefits of the cloud model—and all cloud systems are virtualized—is how machine-driven systems can help to ensure business continuity and speed disaster recovery. Companies of all sizes are always looking for affordable ways to deliver quality IT services reliably and continuously to customers and employees. Cloud computing using virtual machines presents a low-cost disaster recovery and business continuity solution for small and midsize businesses and a more cost-effective alternative to cost-conscious larger corporations.
Once again the Y-12 Tennessee nuclear arms facility's security has been breached.
This time by a little old lady who apparently was got lost.
According to an article on the KnoxNews Website (http://tinyurl.com/ksj8x6f), The security breach occurred less than a year after three protesters cut through a series of security fences and walked to the innermost sanctum of Y-12, the country’s largest repository of weapons-grade uranium.
“I’m not aware of any circumstances quite like this,” said Steven Wyatt, spokesman for the National Nuclear Security Administration and Y-12. He called Thursday’s incident a “security lapse.”
Opening day for baseball season was March 31, coinciding with the monthly commencement of tornado season. Although teams train and are prepared for baseball season, many businesses are not prepared for tornadoes, which we've already felt, unfortunately, or even hurricane season, which launched June 1.
Disasters arrive in three forms — natural, manmade and technological — and, based on their continual emergence, have been labeled the new normal. Natural disasters have increased 40 percent since the early 1990s, and manmade disasters have amplified exponentially since 9/11. The recent 3/11 Japanese earthquake and tsunami crippled automakers and their supply chains. And who would have guessed two hurricanes would cruise the Northeast?
Federal agencies can recovery from disaster quickly with client virtualization
When it comes to business continuity (BC) and disaster recovery (DR), client virtualization is a two-sided coin: There’s what client virtualization offers in terms of continuity and DR preparedness, and what it requires.
Of all the reasons to consider client virtualization, BC and DR may be the most compelling. For example, if a sensitive government agency can never afford a massive virus outbreak in its desktop environment, client virtualization can help it ensure uptime.
Or, as another example, if a company happens to locate its headquarters where earthquakes, tornadoes or hurricanes are common, and losing days or weeks to a natural disaster would cripple operations, then client virtualization presents a compelling, mission-critical investment.
A penny saved is a penny earned. We all know this saying, and most of us try to live by it. Whether you’re the type of person who can’t see a penny on the sidewalk without picking it up, or someone who visits the Frist Center only on the days when admission is free, we all do what we can to save a buck.
In business, finding ways to save money can make a big impact on your bottom line. It’s generally good business practice to keep your capital and operational costs low.
You can do this in several ways, from conducting extensive research before purchasing new equipment and negotiating down supplier contracts, to powering down workstations at night and making do without free soda in the break room.
Hurricane Sandy put many companies to the test: Could they withstand a storm that could shut down business for days, or even weeks?
With no Internet, phone or power and therefore, no way to communicate with employees or customers, workers were unsure whether to go to work, and customers had no way to contact businesses to find out when they’d reopen, what to do in an emergency and if their various appointments would be kept.
How a business responds to emergency situations reveals much about the company’s management skills and disaster preparedness.
Creating a business continuity plan to stay in touch with both employees and customers in the case of a natural disaster, can save companies the suffering from a storm’s scars — which can often be as harsh as putting a company out of business permanently.
Is risk-based security management an art or science? That’s one key question posed to more than 1,200 IT professionals in a recent survey by Tripwire Inc. and Ponemon Research. The report, “The State of Risk Based Security 2013,” asked: “In your opinion, is information security risk management an ‘art’ or ‘science’?” For the purposes of the survey, “art” was defined as analysis and decision-making based on intuition, expertise and a holistic view of the organization. “Science” refers to risk analysis and decision-making based on objective, quantitative measures. They found:
- In the U.S., 49% of respondents said “art” and 51% said “science”
- In the UK, 58% of respondents said “science” and 42% said “art”
- 66% of enterprise risk managers and 62% of business operations respondents say risk based security management is “art”
- 62% of IT security and 56% of IT operations said “science”
CIO - When Carly Simon sang the words "...they were clouds in my coffee" in her 1972 megahit, "You're So Vain," the notion of industrialized cloud-based computing was several decades in the future. Steve Jobs, speaking at Apple's Worldwide Developers Conference in 1997, alluded to the fact that the concept had actually germinated some 10 years earlier.
But Jobs' vision was prescient relative to what we now think of as cloud computing. He was arguably the first to see the huge promise and seismic shift brought on by the advent of device-independent data accessible from anywhere, at any time, on any type of technology, be it an iPhone, iPad, PC or other smart device. This is common today for personal effects such as music, video and financial services-but only recently has this capability begun making its way into the fundamentals of supply chain management.