In 1999, one of the most infamous cyberattacks, back before Y2k and the advent of cybersecurity as we knew it, happened. The NASA and the US Department of Defense computer systems were brought to the ground for three-weeks in a total shutdown, causing a blackout of all NASA’s computers between the NASA headquarters, the International Space Station, and arguably more severely, the Pentagon weapons computer system. A 15-year-old Florida teen, operating out of his parent's house, opened the door to intercept emails, steal passwords, and play in the International Space Station’s data records while nearing U.S. weapon secrets. While it is still…
fortify your business’s online infrastructure
How to Fortify Your Business’s Online Infrastructure Against Downtime
As we saw in February, when more than 350 U.S. government websites were offline, downtime can cause major disruptions, upset,...
READ MORE >
The Data Center Playbook for Disaster Preparedness
Developing a good disaster recovery strategy is essential for both enterprises and the data centers which serve them. A widely...
READ MORE >
A Closer Look at C-SCRM and the IIoT
E-commerce businesses can use a C-SCRM program to maintain the integrity, security, quality, and resilience of a supply chain and...
READ MORE >
Cybersecurity’s Lesser-Known Pain Point: Operational Technology Systems
Worldwide focus on cybersecurity is not new. Over the last decade, governments and corporations have invested heavily in information technology...
READ MORE >