Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Disaster Recovery

Why Automation is a Must Have for Disaster Recovery

23 June 2022

There are many reasons to automate. Some of the more common reasons include offsetting resource constraints as well as adding safety guards …

Tags Application Security, Automation, Disaster Recovery, IT, Why

How to use regional SAML endpoints for failover

31 May 2022

. Although this endpoint is highly available, it is hosted in a single AWS Region, us-east-1. This blog post provides recommendations that …

Tags Disaster Recovery, Federation, How, Identity, Resilience

Test Your Team, Not Just Your Disaster Recovery Plan

25 January 2022

Cyberattacks imperil business continuity, but there is a much more common security threat — unintentional human …

Tags Cloud, Disaster Recovery, Just, Plans, Teams

Top 10 security best practices for securing backups in AWS

12 January 2022

AWS Security Blog Top 10 security best practices for securing backups in AWS Security is a shared responsibility between AWS and the …

Tags Backups, Best Practices, Disaster Recovery, Reliability, Top 10

Cohesity Announces Disaster Recovery as a Service, Providing Automated Disaster Recovery

21 October 2021

…

Tags Automated, Cohesity, Disaster Recovery, IT, Services

Disaster recovery compliance in the cloud, part 2: A structured approach

14 September 2021

Compliance in the cloud is fraught with myths and misconceptions. This is particularly true when it comes to something as broad as disaster …

Tags Canada, Compliance, Disaster Recovery, Disasters, Financial Services

Disaster recovery compliance in the cloud, part 1: Common misconceptions

14 September 2021

Compliance in the cloud can seem challenging, especially for organizations in heavily regulated sectors such as financial services. …

Tags Canada, Commons, Compliance, Disaster Recovery, Disasters

Microsoft Office Zero-Day Hit in Targeted Attacks

7 September 2021

Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. …

Tags Cloud Computing, Cloud Security, Cyberwarfare, Data Protection, Disaster Recovery

New software improves ransomware resilience and recovery

29 July 2021

Ransomware attacks are growing in severity and volume, bringing increasing costs and financial, legal, and other challenges. Businesses …

Tags Articles, Backups, Disaster Recovery, New, Ransomware

Encrypt global data client-side with AWS KMS multi-Region keys

16 June 2021

Today, AWS Key Management Service (AWS KMS) is introducing multi-Region keys, a new capability that lets you replicate keys from one Amazon …

Tags Availability, Disaster Recovery, Encrypt, Encryption, Malware

How to replicate secrets in AWS Secrets Manager to multiple Regions

4 March 2021

On March 3, 2021, we launched a new feature for AWS Secrets Manager that makes it possible for you to replicate secrets across multiple AWS …

Tags Disaster Recovery, How, Regions, Replication, Secrets Manager

What is Disaster Recovery?

15 December 2020

The modern organization’s heavy dependence on using data to drive their business has made having a Disaster Recovery (DR) plan in place a …

Tags Disaster Recovery, Infrastructure Development, IT, Networking, News

9 Cyber Disaster Recovery Planning Tips for a Disaster-Prone Time

3 November 2020

This year has been the ultimate test of business resilience, and if anything has become clear, it’s this: Security pros need to get to work …

Tags Cyber, Disaster Recovery, IT, Planning, Tips

Rethinking Resilience: Tips for Your Disaster Recovery Plan

15 September 2020

The worst time to learn your disaster recovery plan is outdated is when a disaster occurs. As more businesses are prompted to turn to …

Tags Disaster Recovery, IT, Plans, Resilience, Tips
Post navigation
Older posts
Page1 Page2 … Page5 Next →
Cookie-Free

NVD

  • CVE-2022-33128 – RG-EG series gateway EG350 EG_RGOS 11.1(6) was discovered to contain a SQL injection vulne …25 June 2022
  • CVE-2019-25071 – ** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declare …25 June 2022
  • CVE-2022-24893 – ESP-IDF is the official development framework for Espressif SoCs. In Espressifâ&euro …25 June 2022
  • CVE-2022-29168 – Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascrip …25 June 2022
  • CVE-2022-31016 – Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and …25 June 2022
  • CVE-2022-31017 – Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 …25 June 2022

EXPLOITS

  • Marval MSM v14.19.0.12476 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Avantune Genialcloud ProJ 10 – Cross-Site Scripting (XSS)14 June 2022
  • Real Player 16.0.3.51 – ‘external::Import()’ Directory Traversal to Remote Code Execution (RCE)14 June 2022
  • Real Player v.20.0.8.310 G2 Control – ‘DoGoToURL()’ Remote Code Execution (RCE)14 June 2022
  • SolarView Compact 6.00 – ‘pow’ Cross-Site Scripting (XSS)14 June 2022
  • SolarView Compact 6.00 – ‘time_begin’ Cross-Site Scripting (XSS)14 June 2022

SECURELIST

  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022
  • Router security in 20218 June 2022
  • CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction6 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »