Latest from todayOpinionRacks, sprawl and the myth of redundancy: Why your failover isn’t as safe as you thinkToday’s outages hit harder, so smart redundancy — backed by good policies, automation and testing — is the only way to keep traffic flowing when things inevitably break.By Olatunde OlasehanDec 9, 20258 minsBusiness ContinuityCloud SecuritySecurity Opinion Business continuity and cybersecurity: Two sides of the same coinBy Omowunmi MakindeNov 7, 20257 minsCyberattacksData BreachHackingFeature Disaster recovery and business continuity: How to create an effective planBy Neal WeinbergOct 2, 20259 minsBusiness ContinuityDisaster RecoverySecurity OpinionMeet the unsung silent hero of cyber resilience you've been ignoringBy Maman Ibrahim Aug 25, 20256 minsAccess ControlBusiness ContinuityZero Trust OpinionIndia-Pakistan conflict underscores your C-suite’s need to prepare for warBy Christopher Burgess May 8, 20257 minsBusiness ContinuityIT LeadershipRisk Management FeatureHow CISOs can balance business continuity with other responsibilitiesBy Rosalyn Page Mar 31, 202511 minsBusiness ContinuityCSO and CISORisk Management FeatureUAB CIO Gonçal Badenes on ransomware lessons learnedBy Irene Iglesias Álvarez and Esther Macías Nov 11, 20248 minsBusiness ContinuityPhishingRansomware NewsCounting the cost of CrowdStrike: the bug that bit billionsBy Shweta Sharma Jul 26, 20241 minBusiness ContinuityEndpoint Protection FeatureCrowdStrike failure: What you need to knowBy CIO staff Jul 23, 20247 minsBusiness ContinuityIncident ResponseTechnology Industry Articlesfeature5 critical IT policies every organization should have in placeFrom acceptable use policies to remote work guidelines, identifying the rules and procedures for all individuals accessing your organization’s IT resources is an IT security fundamental. By Bob Violino Jul 22, 2024 7 minsBusiness ContinuityDisaster RecoveryIT Strategyhow-toTabletop exercise scenarios: 10 tips, 6 examplesA tabletop exercise is a discussion-based session to test your team on roles and responses during for emergency scenarios. Here are example scenarios and tips to help tune your team for response success.By Josh Fruhlinger and Sarah D. Scalet Jul 4, 2024 16 minsBusiness ContinuityPhishingRansomwarenewsACSC and CISA launch step-by-step business continuity instructions for SMBsBusiness Continuity in a Box is a set of instructions to help businesses maintain communications and continuity of critical applications following a cyber incident.By Samira Sarraf Nov 13, 2023 3 minsBusiness ContinuityCyberattacksnewsCYGNVS exits stealth, trumpeting its cyberattack recovery platformCYGNVS platform promises a playbook, out-of-band connectivity, and more to help organizations recovery from major cyberattacks.By Jon Gold Jan 24, 2023 3 minsBackup and RecoveryBusiness ContinuitynewsKyndryl launches recovery retainer service for cyberattack responseExpert preparedness review and on-demand recovery assistance are featured in Kyndryl’s latest offering.By Jon Gold Jul 25, 2022 2 minsBackup and RecoveryBusiness ContinuitynewsKyndryl rolls out Dell partnership for disaster recovery and securityNew offering aims to synchronize disaster recovery and business continuity with cybersecurity.By Jon Gold Apr 14, 2022 3 minsBackup and RecoveryBusiness Continuityfeature12 steps to take when there’s an active adversary on your networkThese steps will help you respond quickly, without letting a crisis turn into chaos.By Mary K. Pratt Jan 27, 2022 9 minsBusiness ContinuityCSO and CISOIncident ResponsefeatureFSU’s university-wide resiliency program focuses on doing the basics betterAn audit showing inadequate disaster recovery plans in many of the university’s 307 administrative units was the stick CISO Bill Hunkapiller needed to advance a centralized, streamlined resiliency program.By Mary K. Pratt Oct 7, 2021 7 minsBusiness ContinuityCSO and CISORisk ManagementopinionProtecting the supply chain in an era of disruptionsSupply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom. By Chris Dimitriadis Dec 7, 2020 5 minsBusiness ContinuityRisk ManagementSecurityfeature5 steps to building an effective disaster preparedness planDisasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.By Bob Violino Apr 14, 2020 6 minsBusiness ContinuitySecurityfeatureHow one healthcare CISO is navigating the COVID-19 crisisSecurity is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.By Dan Swinhoe Apr 6, 2020 9 minsBusiness ContinuityCareersSecurityfeaturePandemic impact report: Security leaders weigh inA new survey of security and IT leaders sheds light on how organizations across industries are dealing with the COVID-19 crisis, how prepared they were, how vulnerable they are, and what the long-term impact may be.By Bob Bragdon Apr 1, 2020 10 minsBusiness ContinuitySecurity Show more Show less View all Resources whitepaper Cloud-based accelerated computing fast-tracks GenAI at scale Cloud services can offer a quick path to implementing large-scale, computationally intensive GenAI workloads. The post Cloud-based accelerated computing fast-tracks GenAI at scale appeared first on Whitepaper Repository –. By NVIDIA and Microsoft 10 Dec 2024Artificial IntelligenceBusiness ContinuityBusiness Operations whitepaper Road map for creating an AI-ready enterprise By NVIDIA and Microsoft 10 Dec 2024Artificial IntelligenceBusiness ContinuityBusiness Operations View all Video on demand video Ransomware: Do you pay the ransom? | Salted Hash Ep 19 Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. Feb 19, 2018 Backup and RecoveryBusiness ContinuityRansomware See all videos Show me morePopularArticlesPodcastsVideos opinion Cybersecurity isn’t underfunded — It’s undermanaged By JC GaillardDec 11, 20257 mins C-SuiteCSO and CISOIT Strategy how-to How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 mins C-SuiteCSO and CISOIT Leadership news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management Explore a topicApplication SecurityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics