Latest from todayfeatureUAB CIO Gonçal Badenes on ransomware lessons learnedIn 2021, the Barcelona university was hit with an attack that knocked systems offline for two weeks, affecting 50,000 users. Here’s how preparation and partnerships served the university well in its response — and its CIO’s top takeaways from the incident.By Irene Iglesias Álvarez and Esther Macías11 Nov 20248 minsBusiness ContinuityPhishingRansomware news Counting the cost of CrowdStrike: the bug that bit billionsBy Shweta Sharma26 Jul 20241 minBusiness ContinuityEndpoint Protectionfeature CrowdStrike failure: What you need to knowBy CIO staff23 Jul 20247 minsBusiness ContinuityIncident ResponseTechnology Industry feature5 critical IT policies every organization should have in placeBy Bob Violino 22 Jul 20247 minsBusiness ContinuityDisaster RecoveryInternet Security how-toTabletop exercise scenarios: 10 tips, 6 examplesBy Josh Fruhlinger and Sarah D. Scalet 04 Jul 202416 minsBusiness ContinuityPhishingRansomware newsACSC and CISA launch step-by-step business continuity instructions for SMBsBy Samira Sarraf 13 Nov 20233 minsBusiness ContinuityCyberattacks newsCYGNVS exits stealth, trumpeting its cyberattack recovery platformBy Jon Gold 24 Jan 20233 minsBackup and RecoveryBusiness Continuity newsKyndryl launches recovery retainer service for cyberattack responseBy Jon Gold 25 Jul 20222 minsBackup and RecoveryBusiness Continuity newsKyndryl rolls out Dell partnership for disaster recovery and securityBy Jon Gold 14 Apr 20223 minsBackup and RecoveryBusiness Continuity Articlesfeature12 steps to take when there’s an active adversary on your networkThese steps will help you respond quickly, without letting a crisis turn into chaos.By Mary K. Pratt 27 Jan 2022 9 minsBusiness ContinuityCSO and CISOIncident ResponsefeatureBusiness continuity and disaster recovery planning: The basicsGood business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, pandemics and more.By Neal Weinberg 25 Mar 2021 9 minsBusiness ContinuityDisaster RecoverySecurityopinionProtecting the supply chain in an era of disruptionsSupply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom. By Chris Dimitriadis 07 Dec 2020 5 minsBusiness ContinuityRisk ManagementSecurityfeature5 steps to building an effective disaster preparedness planDisasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.By Bob Violino 14 Apr 2020 6 minsBusiness ContinuitySecurityfeatureHow one healthcare CISO is navigating the COVID-19 crisisSecurity is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.By Dan Swinhoe 06 Apr 2020 9 minsBusiness ContinuityCareersSecurityfeature4 steps to build redundancy into your security teamA biological virus infecting your critical security staff could wreak havoc on your business. These practices will reduce your risk.By J.M. Porup 24 Mar 2020 5 minsBusiness ContinuitySecuritynewsMy Health Record avoids cybersecurity breaches despite dizzying growth in usageBy David Braue 11 Nov 2019 3 minsBackup and RecoveryBusiness ContinuityMalwarenewsSingapore government tries a second, expanded bug bountyBy Liam Tung 01 Jul 2019 2 minsBusiness ContinuityCloud SecurityMalwareopinionHow do we build digitally resilient organizations?As we head towards a digitally dependent future, the need for digital resilience has never been greater. Defining digital resilience and describing the need was the first step, but how do we build organizational capability?By Debbie Garside 04 Sep 2018 5 minsBackup and RecoveryBusiness ContinuityDisaster RecoveryopinionAre you prepared for hurricane season? Disaster recovery and business continuity plan best practicesDespite the lull of a calm hurricane season so far, your enterprise’s disaster recovery/business continuity plan needs to be in place.By George Grachis 16 Aug 2018 7 minsBusiness ContinuityData CenterDisaster RecoveryopinionDigital resilience – a step up from cybersecurityWe are living in an increasingly digital world, but many organizations are still unaware of the extent to which they rely on digital technology and the risks that come with it. As we head towards a digitally dependent future, the need for digital resilience has never been greater.By Debbie Garside 01 Aug 2018 4 minsBusiness ContinuityDisaster RecoveryRisk ManagementopinionThe 3 hidden costs of incident responseEvery business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.By Druce MacFarlane 10 May 2018 5 minsBudgetingData BreachInvestigation and Forensics Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation whitepaper How to assess potential business value in 5 minutes – Human Capital Management By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Management whitepaper How to assess potential business value in 5 minutes – Finance and Human Resources By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Leadership View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. 19 Feb 2018 Backup and RecoveryBusiness ContinuityRansomware See all videos Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics