Amazon Web Services (AWS) has confirmed plans to invest another $10 billion in Ohio by the end of the decade as part of an ongoing spending spree to fuel its AI-related growth.
Together with the $7.8 billion AWS announced for Ohio earlier in 2024, and $6 billion invested in 2022, total AWS data center investment in the state is set to reach more than $23 billion by 2030.
Overall Amazon investment since 2010 stands at $35 billion, as it aims to meet the increasing demand for cloud computing, artificial intelligence and data centers.
AWS invests billions in OhioRoger Wehner, AWS VP of Economic Development, said the multi-billion dollar sum will go into creating hundreds of new AWS jobs in technical roles like data center engineers, network specialists, engineering operations managers and security specialists. Locally, telecommunications, facilities maintenance and electricity generation roles are also set to benefit indirectly from increased AWS activity in the region.
Ohio Governor Mike DeWine commented: “AWS’s substantial investment in Ohio will help keep our state at the forefront of the global technology.”
Amazon says that since 2010, it has contributed $31 billion to Ohio’s state GDP, including 38,000 direct jobs and a further 72,000 indirect roles.
Ohio Lieutenant Governor Jon Husted added: “These are significant investments from AWS that support Ohio’s growing reputation as the tech hub of the Midwest.”
The company also noted its commitment to matching its consumption with renewable energy generation, and its Ohio projects have proven instrumental to this, including 23 wind and solar projects that will generate 2.9 gigawatt hours of electricity annually.
Wehner concluded: “The cloud is powering innovation across all sectors of the modern economy. AWS is proud to expand our cornerstone investment beyond Central Ohio to help drive the next generation of cutting-edge technologies such as AI.”
More broadly, the company has been on a spending spree to back its AI advancements, including an $11 billion injection into Indiana and $10 billion in Mississippi, all announced in 2024.
You might also likeFromSoftware has confirmed Elden Ring: Nightreign will feature enemies from Dark Souls.
The 10th-anniversary ceremony for The Game Awards 2024 was an exciting night filled with world premiere trailers and announcements, and among them was the surprise reveal of a brand new Elden Ring spin-off game called Nightreign, a standalone co-op roguelite experience coming in 2025.
The announcement arrived alongside an action-packed trailer, but eagle-eyed fans were quick to notice a few familiar faces from previous FromSoftware releases, notably Dark Souls 3's most formidable boss, the Nameless King.
Although the studio is keeping quiet about the bosses players will be able to encounter in Nightreign, game director Junya Ishizaki has now shared a teaser of what to expect.
Speaking to Famitsu (translated by Eurogamer) Ishizaki confirmed that the spin-off will feature a "small number" of enemies from the Dark Souls series "thanks to the influence of the Night King", adding that it reinforces the sense of "chaos" of the night.
What this means, we can't be sure, but the developer has since shared a teaser on social media hinting at the game's plot, which reads, "In the Night, ancestral foes await - remnants of a fire that once burned bright."
At this time, it's unclear if enemies from other FromSoftware games will appear in Nightreign, but there may be references to Bloodborne's Lady Maria and a grappling hook similar to the one used in Sekiro: Shadows Die Twice featured in the game (via IGN).
There's no release date for Elden Ring: Nightreign just yet, but a network test is scheduled for next year.
You might also like...Meta has received yet another GDPR fine, with the parent company of Facebook, Instagram and WhatsApp facing a €251 million (around $263 million) hit following a 2018 data breach which exposed around 29 million Facebook accounts globally, 3 million of which were EU-based users.
Ireland’s Data Protection Commission (DPC) has been one of Europe’s leading regulatory bodies when it comes to holding tech firms to account, handing out huge penalties for GDPR violations, including the largest ever GDPR fine, a $1.3 billion charge, also against Meta, for data handling.
The most recent violations refer to the attack in which malicious actors used the ‘view as’ feature, which ordinarily allows users to see what their account looks like to their friends and family, to steal access tokens in order to take over the users account.
Millions of users affectedOf the users whose tokens were stolen, 15 million had their phone numbers and email addresses exposed, and a further 14 million also had their usernames, gender, relationship status, and location check-ins accessed. One million lucky users targeted had no data stolen.
Following the breach, the DPC found Facebook infringed GDPR by not including enough information in its breach notification, failing to properly document the facts of the incident. The DPC also found the company failed to ensure the data protection principles were protected, and that Facebook had failed in its ‘obligation as controllers’ to ensure that only necessary personal data is processed.
“This enforcement action highlights how the failure to build in data protection requirements throughout the design and development cycle can expose individuals to very serious risks and harms, including a risk to the fundamental rights and freedoms of individuals,” said DPC Commissioner Graham Doyle.
This may seem like a hefty fine, and it is, but the reality of these GDPR fines is not quite what it seems. So far, only 1% of these DPC fines have been collected, so there's a chance this fine could also get tied up in the appeals process indefinitely.
You might also likeIs it a bird? Is it a plane? No, it's the first official footage from James Gunn's Superman movie!
Well, sort of. The DC Cinematic Universe (DCU) film's inaugural trailer isn't here yet – indeed, the first Superman movie trailer won't actually be released publicly until tomorrow (December 19). But, to whet our appetite ahead of its arrival, DC Studios co-chief James Gunn has given us a taste of what's to come by way of a 30-second teaser.
There's not a lot we can glean from the DCU Chapter One movie's first round of footage. The teaser is filled with sweeping shots, such as an overhead view of a 3D version of The Daily Planet's iconic logo that sits atop its Metropolis-based building, and crowds of people staring up at an unknown object. Among those present in one group is Rachel Brosnahan's Daily Planet reporter Lois Lane, aka Clark Kent/Superman's perennial love interest.
It's not until the 0:10 mark that we actually catch the briefest of glimpses at Corenswet's Man of Steel. It's a blink and you'll miss it moment, which shows the camera closely following Superman as he flies over an icy location. The legendary DC hero's Fortress of Solitude base is often found in remote areas of the world, such as the Arctic, so this shot is likely taken from a part of the film that shows Kent in his home away from home.
Gunn's Superman film takes flight in cinemas worldwide in July 2025 (Image credit: DC Studios/Warner Bros. Pictures)The rest of the teaser comprises similar shots to those mentioned above. Indeed, there are a couple more crowd shots, one of which shows people running away from... something. I'm willing to bet they're not fleeing from the Kryptonian metahuman, but rather the main villain who was seemingly teased in Superman's first image and who'll appear in one of 2025's most anticipated new movies.
Anyway, the final clip shows Superman launching himself into the sky to hide among the clouds. My best guess is this is part of a montage depicting his first flight in his iconic blue and red supersuit, or in a bit to hide from prying eyes. Either way, you'll believe a man can fly once Superman takes flight in theaters on July 11, 2025.
For more Superman movie coverage, read my articles on the film's various on-set leaks, which gave us our first looks at Kent's fellow superheroes. Alternatively, see which Superman movies, all of whom are available on Max (US), Sky/Now TV (UK), and Binge, Foxtel, and iView (Australia), made it onto my best superhero movies list.
You might also likeGoogle has announced a handy update to its Gemini Code Assist platform, expanding the AI-powered coding assistant’s capabilities even further by including support for third-party data sources.
“[Gemini Code Assist tools] enable developers to retrieve information from, or act on any part of their engineering system, which is especially helpful for services outside the IDE," noted a blog post update by Senior Director for Product Management Ryan J Salva and Group Product Manager Prithpal Bhogill.
The news comes shortly after the tech giant announced its latest Gemini Flash 2.0 model, which the company hopes will produce higher-quality responses with lower latency.
Gemini Code Assist is even more powerfulSalva and Bhogill highlighted how the update will enable developers to work more seamlessly with uninterrupted flows; third-party integrations will surface information and tools from other applications without having to leave the IDE.
Google also says that by having access to more data and insights, more efficient development cycles, reduced errors and better software are all possible.
Already, Atlassian (Rovo), GitHub, GitLab, Google Docs, Sentry and Snyk have all been announced as launch partners, offering full support for Gemini Code Assist tools.
Atlassian Head of Product for Agile and DevOps AI, Josh Devenny, commented: “This integration ensures every developer can instantly access technical specifications, tasks in progress, blockers, or even identify the right person to ask for help, all without leaving their coding environment.”
Google also boasted about how it can support other businesses, saying the launch of its new tools will enhance developers’ productivity and “[provide] immense value to [its] partners, offering exciting new opportunities for growth and engagement.”
Developers can express their interest in joining the Gemini Code Assist tools private preview, and signups are also open to use Gemini 2.0 Flash in Gemini Code Assist.
You might also likeOne of my absolute favorite shows on any of the best streaming services this year was Bad Monkey on Apple TV Plus. It's one of the reasons Apple's streaming service was one of our Techradar award winners this year, and my determination to talk endlessly about it at every opportunity may explain why I haven't been invited to any Christmas parties this year.
One of the problems with falling in love with a streaming show is the Netflix curse, which sadly applies to all streamers: it's a business as cut-throat as any of the baddies you'll find in Bad Monkey and many favorite shows end up sleeping with the fishes.
But it looks like Apple is the good guy this time around, because Bad Monkey, one of the best Apple TV Plus shows, is coming back. Back! BACK!
Bad Monkey. Good news. pic.twitter.com/GEzPMd4xiHDecember 17, 2024
More monkey businessThe news was posted on the official Apple TV account on X with just four words: "Bad Monkey. Good news." The post included a short clip of Vince Vaughn and John Ortiz on their familiar beachside chairs before cutting to black and the words: "renewed for season 2".
If you haven't already seen Apple TV Plus' next big comedy from Ted Lasso's co-creator, stop what you're doing and binge it right now. You can thank me later. Based on the book by Carl Hiaasen it's an absolute blast of a Floridian crime caper that's often very funny, occasionally heartbreaking and never less than gripping.
Part of the reason it's such a good show is that every single member of the cast is exceptional. Vaughn as kinda-cop Andrew Yancy is funny and just the right side of annoying to remain likeable rather than insufferable; Jodie Turner-Smith is astonishing as the fierce and frightening Dragon Queen; Rob Delaney and Ronald Peet were spectacular as two very different people whose lives end up in collision; and Crystal the Monkey, who plays Driggs (a monkey), is very good at being a monkey.
I could go on, and often do.
And if news of a second season wasn't enough, it looks like there could be a third. According to writer Bill Lawrence, the show was pitched with a three-season arc in mind. "They were really receptive to it," he says.
As for plot details, they're currently under wraps. But given that Carl Hiaasen's Bad Monkey has a sequel, Razor Girl, that also features Andrew Yancy – and given that Lawrence has previously said he intends to use that book to inspire the second season, you know where to go if you want some spoilers.
Season 1 of Bad Monkey is streaming now on Apple TV Plus.
You might also likeRegulators from the European Union have revealed that they are investigating whether TikTok breached the Digital Services Act in regards to its ‘obligation to properly assess and mitigate systemic risks linked to election integrity’, particularly in regards to the Romanian election.
The investigation will focus on TikTok’s ‘recommender systems’, and the risks associated with ‘coordinated inauthentic manipulation or automated exploitation of the service’. Also being investigated, are TikTok’s policies surrounding paid for political content and advertising.
The Romanian election was recentl annulled following a series of cyberattacks which targeted electoral systems. In the run up to the first round of the contest, the electoral systems suffered over 85,000 attacks, in which access credentials for electoral sites were stolen by threat actors.
Freedom of speech or election interference?The probe has already sparked outrage from members of far-right groups in the European Parliament, with Poland’s Patryk Jaki calling the investigation ‘censorship’ and France's Catherine Griset accusing the EU of looking like a ‘totalitarian regime’ in its fight against misinformation.
Foreign interference into elections has been seen across the world this year, and social media has been a catalyst for the spread of propaganda and misinformation. This EU investigation could potentially lead to action against the platform and set a precedent for other tech organizations.
“We must protect our democracies from any kind of foreign interference. Whenever we suspect such interference, especially during elections, we have to act swiftly and firmly," said Ursula von der Leyen, President of the EU Commission.
“Following serious indications that foreign actors interfered in the Romanian presidential elections by using TikTok, we are now thoroughly investigating whether TikTok has violated the Digital Services Act by failing to tackle such risks. It should be crystal clear that in the EU, all online platforms, including TikTok, must be held accountable.”
Via Politico
More from TechRadar ProPakistan won't block VPNs, despite having the ability to do so.
This was the main takeaway from the country's telecom watchdog, Pakistan Telecommunication Authority (PTA), during its annual end-of-the-year ceremony on Monday, December 16, 2024.
"We had said earlier that we can block VPNs but we won’t do it," said PTA Chairman Maj Gen (retd) Hafeez Ur Rehman, adding that they didn't block any services until today – Pakistani news channel Geo News reported.
The PTA originally set the deadline for November 30 to begin implementing a new policy regulating VPN usage, calling businesses and freelancers to register their service to evade blocks. The Pakistan VPN ban was then withdrawn due to a lack of legal grounds.
Pakistan VPN: a crucial resourceSince the beginning of 2024, Pakistanis have turned en masse to the best VPN apps to navigate an increased censored internet.
Social media access has been the main target for authorities. Residents couldn't use X ( formerly Twitter) without a VPN since February, in fact. Facebook and Instagram were also restricted in July 2024 and May 2023, respectively, according to Surfshark's Internet Tracker. WhatsApp and Bluesky were also blocked in November.
In this context – where circumventing services like VPNs are a crucial resource for residents and visitors – authorities began to crack down on their usage.
For starters, VPNs were reportedly targeted during the year as users faced temporary connectivity issues since February (exactly when X was first restricted). Plans to regulate the use of VPNs to curb their misuse were first shared in August.
Do you know?(Image credit: Shutterstock)A virtual private network (VPN) is security software that encrypts your internet connections to prevent snooping. It also spoofs your real IP address location to boost anonymity and grant access to otherwise geo-restricted content.
Authorities would later deem unregistered VPNs a "security risk" for Pakistan as they can be used to access "sensitive data," with Pakistan's top religious body even saying that using a VPN is "against the Islamic law."
Despite these strong stances, authorities have always stressed that VPN usage is permitted for legitimate purposes such as banking, foreign missions, corporate enterprises, universities, IT companies, call centers, and freelance professionals. Not many guidelines were shared, however, about their non-commercial use.
This is probably why the PTA decided to extend the registration deadline the day it was set to expire. Then, the final verdict – a Pakistan VPN ban goes against the law, according to the country's Law Ministry.
As per sources close to the Interior Ministry, under the Prevention of Electronic Crimes Act (PECA) 2016, the government can block content but not tools (like VPNs, in this instance).
"Eventually, it has been noted that the reading of the Interior Ministry in this regard was weak, and the courts would allow the functioning of the VPNs," the source told the Pakistani English-language newspaper Dawn.
In the meantime, Pakistan has also reportedly implemented a China-like internet firewall that "has the ability to block VPNs" – a Ministry of Defence official, familiar with the new deployments, told Al Jazeera.
The PTA chairman, however, refused to comment on potential shutdowns. "We don’t have answers when we are asked about internet shutdown owing to national security," he said, as per Geo News. "Questions related to national security should be asked from policymakers."
GenAI is being hailed as a revolutionary coding tool. Yes, it creates enormous opportunities for development teams, but we must remember that AI is a junior developer, not an engineer.
The idea that AI will take over app development overlooks a core aspect of a developer’s job. There’s a reason we call them developers or engineers and not code typists. Writing commands has never been the hard part. The challenge lies in ensuring the code solves the problem at hand within the product’s constraints and domain. The current generation of GenAI doesn’t accomplish this.
The developer role is not dead — it’s evolving. With AI assisting with code generation, human developers’ creativity, strategic thinking and contextual understanding will be even more crucial in shaping successful software solutions.
GenAI’s limitations in software developmentDevelopers have long used code templates, generators and auto-complete to expedite programming. GenAI can take these tools one step further by writing entire functions or blocks of code from natural language prompts. However, AI does not fully understand logic and lacks context on business problems and the software’s purpose, resulting in mediocre code.
For example, GenAI can create a code that calculates total sales revenue. However, the output may fail to account for organization-specific variables, such as including returns and rebates in the equation and formatting results to meet reporting requirements. The code technically works, but it does not actually solve the problem.
Additionally, GenAI tools often generate bad code. The training data for the large language models (LLMs) contains both high and low quality data, and the algorithm cannot decipher the difference. Research from Bilkent University measured performance in terms of code quality metrics and found that ChatGPT only wrote correct code 65% of the time, with GitHub Copilot and Amazon CodeWhisperer performing even worse.
AI-generated code can also introduce vulnerabilities and compromise data security by neglecting to follow security protocols. This risk is made more dangerous by many developers' misplaced confidence in the algorithms.
A Stanford University study found that developers who used AI to write code were more likely to believe it was secure when, in fact, it was less so than teams that were not using an AI tool. These results suggest that programmers may become less vigilant in reviewing their work as a result of relying on AI. More than 90% of security leaders have concerns about using AI in coding, but less than half have policies in place to ensure its safe use.
In light of these challenges, experienced human developers will always be necessary in application development.
What does the developer of the future look like?Gartner projects that 90% of enterprise software engineers will use AI code assistants by 2028, shifting developers into strategic advisory roles. However, developers’ core responsibilities — maintaining code quality, strategically adapting systems to changing environments and meeting specific project demands — will remain essential.
Developers and engineers will increasingly act as architects who specify high-level requirements and constraints while AI fills in the detailed coding. This means developers must focus less on writing low-context, low-value code and more on understanding business requirements, system architecture, edge cases and performance testing.
The cooperative relationship between AI and humans could resemble pair programming. AI will play the role of a less-experienced partner performing basic tasks, leaving developers to spend more time guiding and suggesting code improvements.
AI integration might push dev teams to shift further left on traditional code review practices like linting, testing and compliance checks. Since GenAI can produce functional but contextually inaccurate or insecure code, incorporating checks earlier in development allows teams to catch issues proactively. This approach enhances code quality, reduces the risk of errors and maintains consistency.
While GenAI can deliver many benefits, it presents a conundrum for the professional pipeline. With AI functioning as a junior developer, companies may need to hire fewer entry-level developers. This situation limits opportunities for human employees to advance their skills, which results in fewer people equipped to oversee code quality. This scenario remains a problem without a solution — one that needs to be answered soon.
Developer fundamentals will endureA developer’s value lies in understanding the broader purpose and structure of code, not just in the act of writing it. Fundamentally, GenAI will not alter the skills required for this job, though developers may spend less time with their hands on the keyboard. Critical thinking and adaptability will become even more essential for success. With AI managing the bulk of the tedious tasks, developers must master the skills to instruct and correct AI to achieve the desired outcome.
We've featured the best web development tool.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
With AI capabilities compounding cyber attack sophistication, any organization not making it a priority to effectively prepare for potential data breaches could be placing their business at considerable risk.
Incident response refers to the scope of actions and procedures to be taken during an incident. Essentially this is a set of measures taken to deal with security breaches of various types. A robust incident response strategy can not only make a significant difference in preventing data loss, it can also enable firms to respond rapidly in the event of an incident; communicate to the relevant stakeholders; minimize damage to the company reputation; ensure regulations are met, and reduce the costs of a data breach. Sadly, many organizations (tending to be SMEs rather than larger corporations), do not have a well-prepared, up-to-date incident response strategy in place.
Also referred to as IT incidents and security incidents, such events are to be handled in a way to reduce recovery time and costs. To mitigate risks and be prepared for as wide a range of events as possible, it is therefore vital that organizations create a detailed and comprehensive incident response plan.
Incident response vs disaster recoveryAn incident response plan should be incorporated into a disaster recovery plan. These are two components of a comprehensively developed data protection strategy. A common mistake organizations typically make is to create these two plans independently. The right practice is to develop, deploy, and test them as a complex set of measures to protect data security and integrity.
At the same time, even though the objectives of incident response and disaster recovery plans are related, they are not the same. The key difference between incident response and disaster recovery plans lies in the type of events they address. The former defines an incident response team’s roles and responsibilities to ensure smooth running of incident response processes. In turn, a disaster recovery plan focuses on bringing your production environment back to an operational state after an incident occurs and successfully recovering from any caused damage.
An incident response specialist should ensure a uniform approach and make certain that none of the outlined steps are skipped. Another important task is to determine where the problem comes from in order to prevent similar incidents in the future. Finally, it is important to regularly update the incident response plan to make sure it addresses both the ever-evolving cyber threats and current needs of your infrastructure.
If an incident response plan is successfully integrated within the disaster recovery plan, organizations will be able to respond to any disaster in a much faster and more efficient manner.
Building an incident response strategySecurity vulnerabilities, human errors, and technological malfunctions are all possible to avoid, which is why employee training should be a key part of the strategy. In addition, the needs of the environment should be analyzed and it should be ensured that your plans meet them.
Organizations should consider preparing a plan tailored for the possible failure of a VM, network, cloud, data center, and so on. As an example, an effective data protection solution could save quite a lot of time and costs. It should also be considered that there is a risk of a disaster affecting the organization's physical server, office, the entire building, or even a region. Even though some of these scenarios may seem unlikely, it is better to be prepared for as wide a range of unexpected events as possible.
In this way, the purpose of both incident response and disaster recovery plans is to minimize the impact of an unexpected event, recover from it, and return to the normal production level as fast as possible. Also, both of them contain an element of learning: it is important to identify the roots of a problem and, in such a way, decide how to prevent similar incidents in future. The principal difference is their primary objectives. The purpose of an incident response plan is to protect sensitive data during a security breach, while a disaster recovery plan serves to ensure continuity of business processes after a service disruption. While it is key to remember that incident response and disaster recovery are not two separate disciplines, a good practice is to document two plans separately. Even though it may seem that having one document that covers all possible scenarios is a better idea, consolidated plans might lack depth and contain contradictions. This will simplify the process of document creation, as well as enable IT teams to find an appropriate action scope faster, both during testing and in a real-life situation.
Types of security threatsOne of the key principles of incident response and disaster recovery is to carefully develop plans to cover as many recovery scenarios as possible. Naturally, the key point is to do this before a disaster strikes and such a plan is urgently required. To begin with, an attentive look at the types of security incidents is needed. Some of the most common threats are:
DDoS attack
The aim of a distributed denial-of-service (DDoS) attack is to disrupt services and traffic of a target server, network, or website. To carry out an attack, one needs a network of computers infected with malware, or a botnet. The attacker controls bots remotely and sends them the necessary instructions. During a DDoS attack, machines in a botnet start sending simultaneous requests to the target. The flood of malicious traffic can potentially slow down or completely crash the target system. If successful, a DDoS attack renders the service unavailable to users and often results in significant financial damage, as well as the loss or theft of sensitive data.
Malware and ransomware
Malware is a broad term that refers to viruses, worms, spyware, and other types of malicious programs. In some cases, it can act in a relatively inoffensive way (change screen background or delete files), but sometimes it remains hidden and steals sensitive information. Ransomware is a subset of malware, and the key difference is that the system’s user receives a notification with a demand to pay a ransom. As an example, the victim may find their disks or files encrypted, while the attacker normally promises to restore the machine to its previous state after they receive the payment.
Cybersecurity professionals insist that companies should never pay in such cases. On our part, we emphasize that an adequate backup solution is an effective weapon against ransomware. After all, the main reason why a victim might pay a ransom is because they don’t have an alternative.
Phishing
This is a form of cyber fraud with its purpose being to access personally identifiable information (PII). As a rule, attackers use social engineering techniques. The victim might receive an email or text, or come across a social media post containing a link to a page where the visitors are asked to submit their personal details. The key idea is to make the victim believe that they are dealing with a reputable entity like a bank, government agency, or legitimate organization. Incident response in the event of a phishing attack should include both preparation and post-incident phases. It is also important to educate your colleagues so that they can recognize the signs of a phishing attempt and avoid putting the network at risk.
Insider threat
Security threats of this type come from people related to the workflow of an organization, such as its employees, former employees, third parties, contractors, business associates, and so on. In most cases, their main motivation factor is personal gain. However, sometimes malicious insiders want to harm an organization and disrupt its services out of revenge.
A common scenario is when data is stolen on behalf of external parties, such as competitors or business partners. Careless workers who mishandle data or install unauthorized apps pose a threat as well. In other words, all the possible attack vectors must be carefully analyzed to design comprehensive incident response and disaster recovery plans. Once again, training employees and implementing a set of security procedures are two important steps which can help protect the corporate network.
Incident response key takeawaysWhen it comes to building an incident response strategy, the key thing to remember is that the approach is definitely not one size fits all. Incident response development can be a phased and measured, continuous process. And even for smaller organizations on a tight budget, creating an effective plan is achievable, as long as priority is given to protecting the data that is critical to the business. A firm understanding of regulatory liabilities, escalation processes, and adherence to the reporting requirements, is of course vital. The strategy should ensure the inclusion of rules covering the specific incident scenarios detailed above. The incident scenarios and their applicable responses should be practiced regularly to ensure the IT team is up-to-speed and fully prepared to take the necessary action, and that the procedure will be effective in tackling existing threats.
We've featured the best business VPN.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro