Email Alerts
-
Surviving a data disaster: Lexis-Nexis' Leo Cronin
Read how the information security officer for the data broker handled the headlines after last year's major data breach and then decide if he deserves your vote as Top Survivor. Article | 14 Apr 2006
-
DR plans hindered by poor communication
Users at Storage Decisions discussed their strategies for coordinating an effective DR plan with their business managers. Article | 30 Sep 2005
-
New Orleans CIO: It was the wild, wild West
New Orleans CIO Greg Meffert talks with SearchCIO.com about surviving Hurricane Katrina -- and trying to bring New Orleans back to life. Interview | 27 Sep 2005
-
Katrina-related cyberscams surface
Web sites, e-mailers and online auctioneers claim to collect money for hurricane relief efforts. But their real motivation is to steal. Article | 01 Sep 2005
-
Reduce risks of disaster recovery testing
Untested business continuity plans can leave organizations in a lurch. But taking down live environments is risky and complicated. New software could ease the burden and allow companies to test more often. Article | 11 Aug 2005
-
Experts: Security melding with recovery
Enterprises are finding it necessary to integrate security with their recovery, business continuity and availability strategies, and more of those responsibilities are being assumed by CSOs. Article | 15 Oct 2003
-
Gartner: War game creates digital Pearl Harbor
At Gartner's annual security conference, researchers detailed the results of a cyberterrorism scenario developed by 80 owners and administrators of critical infrastructures. Article | 03 Jun 2003
-
Spurred by terrorism threats, Kaiser perfects continuity plan
Anthrax scare inspires Kaiser to speed up disaster planning. Article | 28 Feb 2003
-
5- Disaster Recovery
Top Security Issues Article | 27 Nov 2002
-
The state of IT security: Disaster recovery is hot; biometrics is not
Disaster recovery and backups were deemed the most critical security strategy, a recent survey found. Few security professionals deemed biometric devices as being critical. Article | 30 Aug 2002
Security Management Strategies for the CIO