how-toTabletop exercise scenarios: 10 tips, 6 examplesA tabletop exercise is a discussion-based session to test your team on roles and responses during for emergency scenarios. Here are example scenarios and tips to help tune your team for response success.By Josh Fruhlinger and Sarah D. ScaletJul 04, 202416 minsRansomwarePhishingDisaster Recovery news ACSC and CISA launch step-by-step business continuity instructions for SMBsBy Samira SarrafNov 13, 20233 minsCyberattacksBusiness Continuitynews CYGNVS exits stealth, trumpeting its cyberattack recovery platformBy Jon GoldJan 24, 20233 minsBackup and RecoveryBusiness Continuity newsKyndryl launches recovery retainer service for cyberattack responseBy Jon Gold Jul 25, 20222 minsBackup and RecoveryBusiness Continuity newsKyndryl rolls out Dell partnership for disaster recovery and securityBy Jon Gold Apr 14, 20223 minsBackup and RecoveryBusiness Continuity feature12 steps to take when there’s an active adversary on your networkBy Mary K. Pratt Jan 27, 20229 minsCSO and CISOIncident ResponseBusiness Continuity featureFSU’s university-wide resiliency program focuses on doing the basics betterBy Mary K. Pratt Oct 07, 20217 minsCSO and CISOBusiness ContinuityRisk Management featureBusiness continuity and disaster recovery planning: The basicsBy Neal Weinberg Mar 25, 20219 minsDisaster RecoveryBusiness ContinuitySecurity feature7 critical IT policies you should have in placeBy Bob Violino Mar 16, 20217 minsInternet SecurityDisaster RecoveryIT Strategy ArticlesopinionProtecting the supply chain in an era of disruptionsSupply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom. By Chris Dimitriadis Dec 07, 2020 5 minsBusiness ContinuityRisk ManagementSecurityfeature5 steps to building an effective disaster preparedness planDisasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.By Bob Violino Apr 14, 2020 6 minsBusiness ContinuitySecurityfeatureHow one healthcare CISO is navigating the COVID-19 crisisSecurity is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.By Dan Swinhoe Apr 06, 2020 9 minsBusiness ContinuityCareersSecurityfeaturePandemic impact report: Security leaders weigh inA new survey of security and IT leaders sheds light on how organizations across industries are dealing with the COVID-19 crisis, how prepared they were, how vulnerable they are, and what the long-term impact may be.By Bob Bragdon Apr 01, 2020 10 minsBusiness ContinuitySecurityfeature4 steps to build redundancy into your security teamA biological virus infecting your critical security staff could wreak havoc on your business. These practices will reduce your risk.By J.M. Porup Mar 24, 2020 5 minsBusiness ContinuitySecuritynewsMy Health Record avoids cybersecurity breaches despite dizzying growth in usageBy David Braue Nov 11, 2019 3 minsMalwareBackup and RecoveryBusiness ContinuitynewsSingapore government tries a second, expanded bug bountyBy Liam Tung Jul 01, 2019 2 minsMalwareDisaster RecoveryBusiness ContinuityopinionHow do we build digitally resilient organizations?As we head towards a digitally dependent future, the need for digital resilience has never been greater. Defining digital resilience and describing the need was the first step, but how do we build organizational capability?By Debbie Garside Sep 04, 2018 5 minsBackup and RecoveryBusiness ContinuityDisaster RecoveryopinionAre you prepared for hurricane season? Disaster recovery and business continuity plan best practicesDespite the lull of a calm hurricane season so far, your enterprise’s disaster recovery/business continuity plan needs to be in place.By George Grachis Aug 16, 2018 7 minsDisaster RecoveryBusiness ContinuityData CenteropinionDigital resilience – a step up from cybersecurityWe are living in an increasingly digital world, but many organizations are still unaware of the extent to which they rely on digital technology and the risks that come with it. As we head towards a digitally dependent future, the need for digital resilience has never been greater.By Debbie Garside Aug 01, 2018 4 minsBusiness ContinuityDisaster RecoveryRisk ManagementopinionThe 3 hidden costs of incident responseEvery business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.By Druce MacFarlane May 10, 2018 5 minsData BreachInvestigation and ForensicsDisaster RecoverynewsSalted Hash Ep 24: Defending against mobile threatsWe're back from hiatus! In this week's post, Salted Hash heads to the RSA Conference in San FranciscoBy Steve Ragan May 01, 2018 2 minsHackingMalwareMobile Security Show more Show less View all Resources whitepaper Bringing Postgres, Intel, and HammerDB Together for Cost-Effective Cloud Data Platforms Its essential that cloud enthusiasts develop strategies for navigating cloud complexities and maximizing database spending The post Bringing Postgres, Intel, and HammerDB Together for Cost-Effective Cloud Data Platforms appeared first on Whitepaper Repository –. By EnterpriseDB 30 May 2024Application Performance ManagementBusiness ContinuityDatabase Administration whitepaper Bringing Postgres, Intel, and HammerDB Together for Cost-Effective Cloud Data Platforms By EnterpriseDB 30 May 2024Application Performance ManagementBusiness ContinuityDatabase Administration whitepaper Oracle Aggressive Business Practices Are Drving Customers to Seek Alternatives By Enterprisedb Corporation 01 May 2024Application Performance ManagementBusiness ContinuityDatabase Administration View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. Feb 19, 2018 RansomwareBackup and RecoveryBusiness Continuity See all videos Show me morePopularArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI