feature12 steps to take when there's an active adversary on your networkThese steps will help you respond quickly, without letting a crisis turn into chaos.By Mary K. Pratt27 Jan 20229 minsCSO and CISOIncident ResponseBusiness Continuity how-to Tabletop exercise scenarios: 3 real-world examplesBy Josh Fruhlinger and Sarah D. Scalet30 Jun 202115 minsRansomwarePhishingDisaster Recoveryfeature Business continuity and disaster recovery planning: The basicsBy Neal Weinberg25 Mar 20219 minsDisaster RecoveryBusiness ContinuitySecurity feature7 critical IT policies you should have in placeBy Bob Violino 16 Mar 20217 minsInternet SecurityDisaster RecoveryIT Strategy opinionProtecting the supply chain in an era of disruptionsBy Chris Dimitriadis 07 Dec 20205 minsBusiness ContinuityRisk ManagementSecurity feature5 steps to building an effective disaster preparedness planBy Bob Violino 14 Apr 20206 minsBusiness ContinuitySecurity featureHow one healthcare CISO is navigating the COVID-19 crisisBy Dan Swinhoe 06 Apr 20209 minsBusiness ContinuityCareersSecurity feature4 steps to build redundancy into your security teamBy J.M. Porup 24 Mar 20205 minsBusiness ContinuitySecurity opinionHow do we build digitally resilient organizations?By Debbie Garside 04 Sep 20185 minsBackup and RecoveryBusiness ContinuityDisaster Recovery ArticlesfeatureFSU's university-wide resiliency program focuses on doing the basics betterAn audit showing inadequate disaster recovery plans in many of the university’s 307 administrative units was the stick CISO Bill Hunkapiller needed to advance a centralized, streamlined resiliency program.By Mary K. Pratt 07 Oct 2021 7 minsCSO and CISOBusiness ContinuityRisk ManagementfeaturePandemic impact report: Security leaders weigh inA new survey of security and IT leaders sheds light on how organizations across industries are dealing with the COVID-19 crisis, how prepared they were, how vulnerable they are, and what the long-term impact may be.By Bob Bragdon 01 Apr 2020 10 minsBusiness ContinuitySecuritynewsSamSam group deletes Atlanta’s contact portal after the address goes publicAfter the portal's address was shared with local media and broadcast to the public, the actors behind the Atlanta attacks deleted it rather than deal with questions and commentsBy Steve Ragan 27 Mar 2018 6 minsRansomwareHackingMalwarenewsSamSam ransomware attacks have earned nearly $850,000Since December 2017, the group behind SamSam has continued to collect ransom payments from victims in healthcare, education and governmentBy Steve Ragan 23 Mar 2018 6 minsRansomwareMalwareBackup and RecoveryopinionWhy we continue to fail: lessons learned from the Atlanta Airport fiascoFive basic failures happened that make the Atlanta airport a softer target for future attack.By Thomas Trent 02 Jan 2018 5 minsTechnology IndustryCyberattacksDisaster RecoveryfeatureWhy incident response is the best cybersecurity ROIFormer White House CIO Theresa Payton says unexpected breaches can wreak havoc on a company's bottom line. Proper IR planning can mitigate damage costs.By Steve Morgan 18 Dec 2017 6 minsData BreachCyberattacksHackingopinionReliability vs. redundancy: aren't they the same thing?Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.By Bret Piatt 08 Dec 2017 5 minsTechnology IndustryDisaster RecoveryBusiness ContinuitynewsThe best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacksIf one financial services firm cyber destructs, then another one takes over.By Steve Morgan 05 Dec 2017 4 minsData BreachInternet SecurityBackup and RecoveryopinionThe risk of shadow IT to business continuityWe hear about IT systems going down but how much do we think about whether incidents could have been prevented by taking adequate risk mitigation measures? By Beth Baxter 15 Nov 2017 4 minsBackup and RecoveryBusiness Continuityopinion5 rules for smarter cyber communicationsIt’s time to get smarter about this lesser known aspect of your cybersecurity program. By Loren Mahler 12 Oct 2017 5 minsData BreachDisaster RecoveryBusiness ContinuitynewsGovernment policy targets APAC for sharing, commercialising Australia's cybersecurity experienceBy David Braue 04 Oct 2017 4 minsMalwareMobile SecurityTechnology IndustryopinionImproving cybersecurity governance in the boardroomTo tackle increasing data threats, companies need to put cybersecurity at the very heart of the business.By Brian Harrell 25 Sep 2017 6 minsBusiness ContinuityData and Information SecurityIT Leadership Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. 19 Feb 2018 RansomwareBackup and RecoveryBusiness Continuity See all videos Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI