CenturyLink Technology Solutions

Business continuity plan News

View All News

Business continuity plan Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Business continuity plan Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Business continuity plan

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Business continuity plan Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Don't overlook these business resilience plan essentials

    Business resilience planning requires preventive and proactive protections across power supply, systems, cybersecurity and backup procedures. Staff planning is important as well. Continue Reading

  • Machine learning in security explodes: Does it work?

    Machine learning in security is continuing to advance, and many companies now claim to have introduced artificial intelligence techniques into their platforms. With the high volume of data that most security teams have to prioritize, machine learning in security technology is increasingly being adopted as a way to reduce the noise that traditional security products produce.

    Smaller companies, such as Keen Footwear, have turned to threat platforms that incorporate machine learning and AI techniques -- and soon automated defense -- to solve a variety of problems. "I don't need to go hire someone dedicated to security," said Clark Flannery, director of IT at Keen's headquarters in Portland, Ore. "It just feels like a whole team back there -- who are way more qualified than [staff] I would be able to pay."

    With security professionals in short supply, companies like Keen are relying on these technologies to make it easier to spot and respond to attacks. While machine learning and artificial intelligence are often used interchangeably, the concepts are different. In this issue of Information Security magazine, we discuss the nuances and dive into the current state of the technology. Machine learning in security offers information security analysts more depth of knowledge, helping to detect patterns and related analysis they may not otherwise have known about.

     Continue Reading

  • How an IT business continuity plan differs with colocation vs. cloud

    To avoid the disaster recovery safety net, build an IT business continuity plan for your data center. But before you do, weigh the pros and cons of using colocation vs. cloud. Continue Reading

View All Problem Solve