newsCounting the cost of CrowdStrike: the bug that bit billionsCyber insurance coverage is set to cover only a fraction of the losses, leaving affected businesses to grapple with substantial uncovered expenses.By Shweta Sharma26 Jul 20241 minBusiness ContinuityEndpoint Protection feature CrowdStrike failure: What you need to knowBy CIO staff23 Jul 20247 minsTechnology IndustryIncident ResponseBusiness Continuityfeature 5 critical IT policies every organization should have in placeBy Bob Violino22 Jul 20247 minsInternet SecurityDisaster RecoveryIT Strategy how-toTabletop exercise scenarios: 10 tips, 6 examplesBy Josh Fruhlinger and Sarah D. Scalet 04 Jul 202416 minsRansomwarePhishingDisaster Recovery newsACSC and CISA launch step-by-step business continuity instructions for SMBsBy Samira Sarraf 13 Nov 20233 minsCyberattacksBusiness Continuity newsCYGNVS exits stealth, trumpeting its cyberattack recovery platformBy Jon Gold 24 Jan 20233 minsBackup and RecoveryBusiness Continuity newsKyndryl launches recovery retainer service for cyberattack responseBy Jon Gold 25 Jul 20222 minsBackup and RecoveryBusiness Continuity newsKyndryl rolls out Dell partnership for disaster recovery and securityBy Jon Gold 14 Apr 20223 minsBackup and RecoveryBusiness Continuity feature12 steps to take when there’s an active adversary on your networkBy Mary K. Pratt 27 Jan 20229 minsCSO and CISOIncident ResponseBusiness Continuity ArticlesfeatureBusiness continuity and disaster recovery planning: The basicsGood business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, pandemics and more.By Neal Weinberg 25 Mar 2021 9 minsDisaster RecoveryBusiness ContinuitySecurityopinionProtecting the supply chain in an era of disruptionsSupply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom. By Chris Dimitriadis 07 Dec 2020 5 minsBusiness ContinuityRisk ManagementSecurityfeature5 steps to building an effective disaster preparedness planDisasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.By Bob Violino 14 Apr 2020 6 minsBusiness ContinuitySecurityfeatureHow one healthcare CISO is navigating the COVID-19 crisisSecurity is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.By Dan Swinhoe 06 Apr 2020 9 minsBusiness ContinuityCareersSecurityfeature4 steps to build redundancy into your security teamA biological virus infecting your critical security staff could wreak havoc on your business. These practices will reduce your risk.By J.M. Porup 24 Mar 2020 5 minsBusiness ContinuitySecuritynewsMy Health Record avoids cybersecurity breaches despite dizzying growth in usageBy David Braue 11 Nov 2019 3 minsMalwareBackup and RecoveryBusiness ContinuitynewsSingapore government tries a second, expanded bug bountyBy Liam Tung 01 Jul 2019 2 minsMalwareDisaster RecoveryBusiness ContinuityopinionHow do we build digitally resilient organizations?As we head towards a digitally dependent future, the need for digital resilience has never been greater. Defining digital resilience and describing the need was the first step, but how do we build organizational capability?By Debbie Garside 04 Sep 2018 5 minsBackup and RecoveryBusiness ContinuityDisaster RecoveryopinionAre you prepared for hurricane season? Disaster recovery and business continuity plan best practicesDespite the lull of a calm hurricane season so far, your enterprise’s disaster recovery/business continuity plan needs to be in place.By George Grachis 16 Aug 2018 7 minsDisaster RecoveryBusiness ContinuityData CenteropinionDigital resilience – a step up from cybersecurityWe are living in an increasingly digital world, but many organizations are still unaware of the extent to which they rely on digital technology and the risks that come with it. As we head towards a digitally dependent future, the need for digital resilience has never been greater.By Debbie Garside 01 Aug 2018 4 minsBusiness ContinuityDisaster RecoveryRisk ManagementopinionThe 3 hidden costs of incident responseEvery business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.By Druce MacFarlane 10 May 2018 5 minsData BreachInvestigation and ForensicsDisaster RecoverynewsSalted Hash Ep 24: Defending against mobile threatsWe're back from hiatus! In this week's post, Salted Hash heads to the RSA Conference in San FranciscoBy Steve Ragan 01 May 2018 2 minsHackingMalwareMobile Security Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper 2023 GigaOm Radar Report on Autonomous Security Operation Center (SOC) Solutions [XSIAM] By Palo Alto Networks 11 Jul 2024Artificial IntelligenceSecuritySecurity Software whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. 19 Feb 2018 RansomwareBackup and RecoveryBusiness Continuity See all videos Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI