Latest from todayfeatureUAB CIO Gonçal Badenes on ransomware lessons learnedIn 2021, the Barcelona university was hit with an attack that knocked systems offline for two weeks, affecting 50,000 users. Here’s how preparation and partnerships served the university well in its response — and its CIO’s top takeaways from the incident.By Irene Iglesias Álvarez and Esther Macías11 Nov 20248 minsBusiness ContinuityPhishingRansomware news Counting the cost of CrowdStrike: the bug that bit billionsBy Shweta Sharma26 Jul 20241 minBusiness ContinuityEndpoint Protectionfeature CrowdStrike failure: What you need to knowBy CIO staff23 Jul 20247 minsBusiness ContinuityIncident ResponseTechnology Industry feature5 critical IT policies every organization should have in placeBy Bob Violino 22 Jul 20247 minsBusiness ContinuityDisaster RecoveryInternet Security how-toTabletop exercise scenarios: 10 tips, 6 examplesBy Josh Fruhlinger and Sarah D. Scalet 04 Jul 202416 minsBusiness ContinuityPhishingRansomware newsACSC and CISA launch step-by-step business continuity instructions for SMBsBy Samira Sarraf 13 Nov 20233 minsBusiness ContinuityCyberattacks newsCYGNVS exits stealth, trumpeting its cyberattack recovery platformBy Jon Gold 24 Jan 20233 minsBackup and RecoveryBusiness Continuity newsKyndryl launches recovery retainer service for cyberattack responseBy Jon Gold 25 Jul 20222 minsBackup and RecoveryBusiness Continuity newsKyndryl rolls out Dell partnership for disaster recovery and securityBy Jon Gold 14 Apr 20223 minsBackup and RecoveryBusiness Continuity Articlesfeature12 steps to take when there’s an active adversary on your networkThese steps will help you respond quickly, without letting a crisis turn into chaos.By Mary K. Pratt 27 Jan 2022 9 minsBusiness ContinuityCSO and CISOIncident ResponsefeatureBusiness continuity and disaster recovery planning: The basicsGood business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, pandemics and more.By Neal Weinberg 25 Mar 2021 9 minsBusiness ContinuityDisaster RecoverySecuritybrandpostSponsored by NTTSimplify and secure: How Aussie businesses should be operating a hybrid workforceBy NTT 23 Mar 2021 5 minsBusinessBusiness ContinuityRemote WorkopinionProtecting the supply chain in an era of disruptionsSupply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom. By Chris Dimitriadis 07 Dec 2020 5 minsBusiness ContinuityRisk ManagementSecurityfeature5 steps to building an effective disaster preparedness planDisasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.By Bob Violino 14 Apr 2020 6 minsBusiness ContinuitySecurityfeatureHow one healthcare CISO is navigating the COVID-19 crisisSecurity is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.By Dan Swinhoe 06 Apr 2020 9 minsBusiness ContinuityCareersSecurityfeature4 steps to build redundancy into your security teamA biological virus infecting your critical security staff could wreak havoc on your business. These practices will reduce your risk.By J.M. Porup 24 Mar 2020 5 minsBusiness ContinuitySecuritynewsAustralians worry about data security but remain blasé about behaving securelyBy David Braue 11 Dec 2019 3 minsBackup and RecoveryBusiness ContinuityMalwarenewsAustralian businesses slower to detect breaches than global peers, but everyone is still taking too longBy David Braue 21 Nov 2019 4 minsBackup and RecoveryBusiness ContinuityMalwarenewsAs government reins in IoT security, recalcitrant mining industry is exposedBy David Braue 19 Nov 2019 4 minsApplication SecurityBackup and RecoveryMalwarenewsNew Zealand: over a third of cyber attacks come from state-sponsored hackersBy Liam Tung 19 Nov 2019 3 minsAccess ControlBackup and RecoveryMalwarenewsAustralia releases advice to counter ‘foreign interference’ after university cyber attacksBy Liam Tung 14 Nov 2019 4 minsAccess ControlBackup and RecoveryMalware Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation whitepaper How to assess potential business value in 5 minutes – Human Capital Management By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Management whitepaper How to assess potential business value in 5 minutes – Finance and Human Resources By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Leadership View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. 19 Feb 2018 Backup and RecoveryBusiness ContinuityRansomware See all videos Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics