(TNS) - Security at France’s 58 nuclear power plants was purportedly raised to its highest level last month as a result of the terrorist attacks in Paris, stoking concern over the safety of Japan’s nuclear facilities.
After the triple meltdown in Fukushima in 2011, Japan shut down all 48 of its viable commercial reactors in light of the crisis. But attempts are now being made to bring many back online.
And despite opposition from anti-nuclear activists and groups, two reactors in Sendai, Kagoshima Prefecture, were restarted this fall and summer, with applications for 26 more pending Nuclear Regulation Authority approval.
(TNS) - The International Code Council has approved building code changes recommended by the National Institute of Standards and Technology after it conducted an in-depth investigation into the EF-5 tornado that struck Joplin, Mo., on May 22, 2011.
Enhanced protection will be required for new school buildings and additions to buildings on existing school campuses, as well as high-occupancy structures associated with schools where people regularly assemble, such as a gymnasium, theater or community center.
Under the updated codes, storm shelters must be provided that protect all occupants from storms with wind speeds of 250 mph, representing the maximum intensity category of EF-5.
How do you prepare for the unexpected? What can you learn from past severe weather events? Are you ready for the next big El Nino?
Communities along the Southern Pacific Ocean are forced to ask themselves these questions with the upcoming storm, predicted to arrive in January and stay as long as May. El Nino typically cycles every three to seven years and brings unusually wet conditions causing flooding, mudslides, frequent storms, buckled roads, and destroyed homes.  A climatologist at NASA’s Jet Propulsion Lab warned that “these storms are imminent…El Nino is here. And it is huge.”
Communities that are in locations prone to the storm have already started preparing and have learned lessons from the strongest El Nino reported which was in 1988. With this year’s El Nino predicted to be the second largest by the National Weather Service,  no precaution is being overlooked. The California Department of Transportation has increased their maintenance staff by 25% and in Malibu, public works departments will be on call 24/7 during the storm. 
As business continuity professionals, we do our best to make sure that our organizations are able to withstand disruption and carry on in as normal a way as possible. But how do you cope when the disruption is so widespread? Even if by some miracle your organization remains intact and functional, devastation still lies all around you. Your customers and suppliers may not be able to access you. Your customers and suppliers may no longer exist.
This is what the people of Chennai are facing, a city in India where the BCI has only recently set up a new Forum. Torrential rain has resulted in terrible flooding. Hundreds of people have died, and thousands of families have been displaced. As many of us celebrate the season of peace and goodwill, it is important that we share a little bit of that with others. In a season when we can become so obsessed with what we get as presents, it is important that we keep our minds open to what we can give.
It has become traditional for the Business Continuity Institute to make a donation at this time of year and this year we will be sending money to the Chennai Flood Relief Fund being organized by Global Giving. Initially, the fund will help first responders meet survivors' immediate need for food, fuel, clean water, hygiene products, and shelter. Once initial relief work is complete, the fund will transition to support longer-term recovery efforts run by local, vetted organizations. If you would like to make a donation, just visit the Global Giving website.
The BCI wishes all our Chapter Leaders, Forum Leaders, the BCI Board, Global Membership Council and fellow business continuity and resilience professionals around the world, Seasons' Greetings and a healthy 2016.
Note that the BCI Central Office will be closed on the 25th and 28th December and the 1st January 2016, re-opening on Monday 4th January 2016. On the 29th, 30th and 31st December, the office will be staffed between 10am and 3pm only (GMT).
HAWTHORNE, NJ – STEALTHbits Technologies Inc., a leading data security software company that ensures the right people have the right access to the right information, announced the latest release of its flagship StealthAUDIT product, continuing the extension of its industry-leading on premise capabilities to the cloud.
"The principles of effective and efficient data access governance extend without compromise to the cloud," said Adam Laub, STEALTHbits SVP, Product Marketing. "With this release of StealthAUDIT, we continue the rapid extension of our critical functionality to off-premise resources."
StealthAUDIT has provided enterprise-level, highly scalable and flexible unstructured data access management solutions to some of the world's largest organizations for over a decade. Understanding who owns sensitive data stored in unstructured form, and who has access to it, is a seminal data security principle, and its importance has been amplified as the list of high profile enterprise breaches expands daily.
"The two pillars of data security are detecting and stopping bad actors on the network, but also understanding and limiting access to sensitive data to only those who require it to do their jobs," added Laub. "Many organizations today focus on the former, neglecting data access governance prior to a malicious intrusion, ultimately making it much easier for attackers to steal sensitive data once they've established a beachhead."
In addition to adding support for Microsoft's Azure cloud-based directory service and Dropbox for Business, the newest release of StealthAUDIT, 7.1, improves StealthAUDIT's NAS and UNIX support, improved file owner activity alerts, and adds a number of product efficiency enhancements.
Upgrades for version 7.1 of StealthAUDIT will be available starting January 15th. To learn more, we invite you to visit http://stealthbits.com/new-stealthaudit-release. Or, to arrange a private demonstration, contact us at firstname.lastname@example.org.
ABOUT STEALTHbits Technologies
Identify threats. Secure data. Reduce risk.
STEALTHbits is a data security software company. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.
The STEALTHbits logo and all other STEALTHbits product or service names and slogans are registered trademarks or trademarks of STEALTHbits Technologies, Inc. All other trademarks and registered trademarks are property of their respective owners.
SAN JOSE, Calif. – A10 Networks (NYSE: ATEN), the leader in application networking and security, today announced a collaboration with Verisign to enable hybrid DDoS mitigation strategies for customers. A10 Networks further announced enhancements to its market-leading multi-vector DDoS protection solution, Thunder TPS (Threat Protection System) -- including the ability to send alerts to Verisign's cloud-based DDoS Protection Service using the OpenHybrid™ API.
Thunder TPS 3.2 now enables more organizations to intelligently provide an always-on application experience. New features and customer benefits include:
- Smarter DDoS attack detection and dynamic mitigation with Thunder TPS 3.2. Traffic baselines leverage multi-protocol behavioral indicators to learn peacetime network conditions, enabling precise detection of anomalies. Dynamic mitigation policies escalate suspect traffic through progressively tougher countermeasures to minimize legitimate traffic drops. DevOps can leverage event-based scripting for increased operational agility.
- Automated signaling for volumetric attack protection through Verisign's cloud DDoS protection service. The redirection option utilizes the Verisign OpenHybrid™ API to provide anomaly information and can trigger a swing of customer's traffic to Verisign's cloud-based services when volumetric DDoS protection is needed. This hybrid solution broadens the market reach of Thunder TPS to enterprises with limited internet bandwidth.
- Integration with existing DDoS solutions for investment protection. Leveraging open networking standards, Thunder TPS mitigation integrates easily with existing DDoS detection solutions. Open networking standards support enables tight integration with many other devices, including SDN controllers and security products.
In addition to Thunder 3.2 and the Verisign DDoS Protection Service, organizations can further complement their DDoS protection with the recently announced:
- aGalaxy to streamline operations. Empowering administrators to centrally manage multiple Thunder TPS deployments to enable real-time troubleshooting, incident management and reporting.
- A10 Threat Intelligence Service to increase security efficacy. Providing a dynamic intelligence feed that prevents data theft, reduces the network load, and minimizes the attack surface.
"Devastating multi-vector DDoS attacks are on the rise and in everyday news. Organizations will inevitably become targets of these cyber-attacks, causing major disruptions to their business," said Sanjay Kapoor, Vice President Global Marketing at A10 Networks. "With the expanded capabilities of Thunder TPS 3.2 and integration with Verisign's OpenHybrid™, organizations can enable the always-on application experience that their customers demand from them."
"In today's growing DDoS threat landscape, organizations must protect and ensure the availability of their critical applications. A10's Thunder TPS appliance's ability to signal with Verisign cloud-based DDoS Protection Service enables customers to implement an effective hybrid DDoS protection strategy," said Ramakant Pandrangi, Vice President of Product Management for Verisign's Security Services.
Thunder TPS 3.2, the Verisign DDoS Protection Service, aGalaxy, and the A10 Threat Intelligence Service are available now.
"Customers trust C4L to protect them from the crippling effects of a vast array of escalating multi-vector DDoS attacks on a daily basis," said Gary Barter, Head of Marketing at C4L. "Thunder TPS 3.2 greatly expands our effectiveness through the surgical nature of the countermeasures, the comprehensive baselining, anomaly detection capabilities, and detailed monitoring."
"A10 has built a loyal base of service provider and enterprise customers that value the performance, the manageability, and the advanced features of the entire product line," said Jeff Wilson, Research Director, Cybersecurity Technology at IHS Inc. "Thunder TPS 3.2 and the Verisign partnership enable A10 to broaden market reach of its DDoS detection and mitigation solutions to customers' lower bandwidth requirements."
"We have seen rapid growth in our security practice as organizations seek to defend themselves from a variety of internal and external threats, including multi-vector DDoS attacks," said Jason Gress, President and Co-founder of InterVision. "With enhanced management, detection, and a cloud-based protection service with a known leader in Verisign, the A10 Thunder TPS solution has matured into a compelling solution for our enterprise customers."
About A10 Networks
A10 Networks (NYSE: ATEN) is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: https://www.a10networks.com and @A10Networks.
The A10 logo, A10 Networks, A10 Thunder, Thunder, Thunder TPS, and aGalaxy are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners.
FXT Edge Filers and Advanced Media Asset Management Services Enable High Performance, Cost-Effective Access to Digital Media Assets
PITTSBURGH, Pa. – Avere Systems, a leading provider of enterprise storage for the hybrid cloud, and CatDV, a Square Box Systems product that provides the most advanced digital media asset management (MAM) solution on the market, announced a joint solution that allows accessibility of media files stored in private clouds. Using Avere's FXT Edge Filer technology behind CatDV's MAM solution, users can create an affordable, active archive of their digital media assets with a supported private object storage solution. This combined approach allows for higher capacity storage for media assets at lower cost, all while still retaining on-premise response times.
Digital media assets can be extremely valuable as they either cannot be recreated or would be extremely expensive to do so. At the same time, the volume of digital assets continues to increase as media becomes easier to create and edit. Managing and protecting this growing collection of large, valuable, digital asset files poses challenges -- storing massive amounts of large media files on traditional NAS storage can be prohibitively expensive and tape systems are difficult to access. Avere and CatDV's joint solution provides the best of both worlds, offering archival storage in the private cloud, therefore minimizing costs while ensuring accessibility.
"The best media asset management tools unlock the value of your media assets. Users need the ability to quickly find and reuse media content, which makes storage an important part of the MAM equation," said Dave Clack, CEO at Square Box Systems, maker of CatDV. "By working with Avere, we're ensuring that our customers get reliable access to high capacity, lower cost storage that can scale with the increasing amounts of digital content companies are now expected to store."
Avere's FXT Edge filer acts as a translator between CatDV and object storage -- for example, Cleversafe, HGST or SwiftStack -- providing cloud gateway functionality that translates files into object storage and vice versa. This functionality allows CatDV to present all digital media assets in an organized, searchable and user-friendly interface that enables users to quickly find media assets across all storage -- both in the cloud and on premises. The Avere Edge filer also eliminates the latency typically experienced when using low performance storage by keeping hotter, more frequently used data in flash and other high speed media.
"As digital media assets continue to grow in importance and accumulate in volume, CatDV and Avere together offer a media management solution that is cost-effective and allows users to keep assets usable by their production teams without compromises," said Ron Bianchini, CEO and president at Avere Systems.
About Avere Systems
Avere is radically changing the economics of data storage. Avere's hybrid cloud solutions give companies -- for the first time -- the ability to end the rising cost and complexity of data storage and compute via the freedom to store and access files anywhere in the cloud or on premises, without sacrificing the performance, availability, or security of enterprise data. Based in Pittsburgh, Avere is led by veterans and thought leaders in the data storage industry and is backed by investors Lightspeed Venture Partners, Menlo Ventures, Norwest Venture Partners, Tenaya Capital, and Western Digital Capital. For more information, visit www.averesystems.com.
Throughout 2015, Everbridge was proud to work hand-in-hand with corporations of all sizes, across all industries to deliver top-notch security and safety for stakeholders. Corporations are under immense pressure to keep employees, infrastructure and customer safe during various types of events – weather related emergencies, building security failures, data breeches etc. The past year proves how critical it is for corporations to leverage a notification system to communicate with stakeholders and improve business continuity. With 2016 quickly approaching, we took a trip down memory lane and gathered some of our “best of 2015″ quotes, inclusions and testimonials from our partners, employees and customers. Throughout the “best of” list, several themes persist including threat monitoring, IT Alerting and the Internet of Things.
Thanks for taking some time to reflect on 2015 — here goes!
Will it be cheaper to run a particular application in the cloud than keeping it in the corporate data center? Would a colo be cheaper? Which servers in the data center are running at low utilization? Are there servers that have been forgotten about by the data center manager? Does it make sense to replace old servers with new ones? If it does, which ones would be best for my specific applications?
Those are examples of the essential questions every data center manager should be asking themselves and their team every day if they aren’t already. Together, they can be distilled down to a single ever-relevant question: How much does it cost to run an application?
Answering it is incredibly complex, which is the reason startups like TSO Logic, Romonet, or Coolan, among others, have sprung up in recent years. If you answer it correctly, the pay-off can be substantial, because almost all data centers are not running as efficiently as they can, and there’s always room for optimization and savings.
Amid all the technological changes set to take place in the coming year, the enterprise is on the verge of a momentous operational and organizational transformation as well. One of the most significant aspects of this is the rise of Dev/Ops as the driving force behind the delivery of IT services.
Before long, virtually the entire data stack will sit atop a virtual architecture residing on commodity hardware. Sure, there will always be a need for bare-metal functionality, but even then, those resources will be treated like managed services within an automated, software-defined ecosystem.
This means knowledge workers hoping for a new application won’t have to wait for coders and IT technicians to come together in a months-long development process that usually ends in either marginal success or abject failure. In the future, a combined Dev/Ops team, including the business unit in need of the app, will create the code, test it in the lab, provision the virtual resources, and then launch it into production environments, all within a matter of days or weeks.