newsACSC and CISA launch step-by-step business continuity instructions for SMBsBusiness Continuity in a Box is a set of instructions to help businesses maintain communications and continuity of critical applications following a cyber incident.By Samira Sarraf13 Nov 20233 minsCyberattacksBusiness Continuity news CYGNVS exits stealth, trumpeting its cyberattack recovery platformBy Jon Gold24 Jan 20233 minsBackup and RecoveryBusiness Continuitynews Kyndryl launches recovery retainer service for cyberattack responseBy Jon Gold25 Jul 20222 minsBackup and RecoveryBusiness Continuity newsKyndryl rolls out Dell partnership for disaster recovery and securityBy Jon Gold 14 Apr 20223 minsBackup and RecoveryBusiness Continuity feature12 steps to take when there's an active adversary on your networkBy Mary K. Pratt 27 Jan 20229 minsCSO and CISOIncident ResponseBusiness Continuity how-toTabletop exercise scenarios: 3 real-world examplesBy Josh Fruhlinger and Sarah D. Scalet 30 Jun 202115 minsRansomwarePhishingDisaster Recovery featureBusiness continuity and disaster recovery planning: The basicsBy Neal Weinberg 25 Mar 20219 minsDisaster RecoveryBusiness ContinuitySecurity feature7 critical IT policies you should have in placeBy Bob Violino 16 Mar 20217 minsInternet SecurityDisaster RecoveryIT Strategy opinionProtecting the supply chain in an era of disruptionsBy Chris Dimitriadis 07 Dec 20205 minsBusiness ContinuityRisk ManagementSecurity ArticlesnewsSamSam explained: Everything you need to know about this opportunistic group of threat actorsThe group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.By Steve Ragan 18 Apr 2018 11 minsAdvanced Persistent ThreatsRansomwareHackingnewsCustomers describe the impact of the Allscripts ransomware attackThere were three victims during the SamSam ransomware attack against Allscripts — the company, its customers, and the patients those customers serve.By Steve Ragan 17 Apr 2018 10 minsData BreachRansomwareHealthcare IndustrynewsRansomware, healthcare and incident response: Lessons from the Allscripts attackThe actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.By Steve Ragan 16 Apr 2018 11 minsData BreachRansomwareHealthcare IndustrynewsAllscripts: Ransomware, recovery, and frustrated customersSalted Hash will be running a series this week, but Insiders can read the entire series today.By Steve Ragan 15 Apr 2018 1 minRansomwareBusiness ContinuityCybercrimenewsSamSam group deletes Atlanta’s contact portal after the address goes publicAfter the portal's address was shared with local media and broadcast to the public, the actors behind the Atlanta attacks deleted it rather than deal with questions and commentsBy Steve Ragan 27 Mar 2018 6 minsRansomwareHackingMalwarenewsSamSam ransomware attacks have earned nearly $850,000Since December 2017, the group behind SamSam has continued to collect ransom payments from victims in healthcare, education and governmentBy Steve Ragan 23 Mar 2018 6 minsRansomwareMalwareBackup and RecoveryopinionWhy we continue to fail: lessons learned from the Atlanta Airport fiascoFive basic failures happened that make the Atlanta airport a softer target for future attack.By Thomas Trent 02 Jan 2018 5 minsTechnology IndustryCyberattacksDisaster RecoveryfeatureWhy incident response is the best cybersecurity ROIFormer White House CIO Theresa Payton says unexpected breaches can wreak havoc on a company's bottom line. Proper IR planning can mitigate damage costs.By Steve Morgan 18 Dec 2017 6 minsData BreachCyberattacksHackingopinionReliability vs. redundancy: aren't they the same thing?Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.By Bret Piatt 08 Dec 2017 5 minsTechnology IndustryDisaster RecoveryBusiness ContinuitynewsThe best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacksIf one financial services firm cyber destructs, then another one takes over.By Steve Morgan 05 Dec 2017 4 minsData BreachInternet SecurityBackup and RecoveryopinionThe risk of shadow IT to business continuityWe hear about IT systems going down but how much do we think about whether incidents could have been prevented by taking adequate risk mitigation measures? By Beth Baxter 15 Nov 2017 4 minsBackup and RecoveryBusiness Continuityopinion5 rules for smarter cyber communicationsIt’s time to get smarter about this lesser known aspect of your cybersecurity program. By Loren Mahler 12 Oct 2017 5 minsData BreachDisaster RecoveryBusiness Continuity Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. 19 Feb 2018 RansomwareBackup and RecoveryBusiness Continuity See all videos Show me morePopularArticlesPodcastsVideos news Top cybersecurity product news of the week By CSO staff 30 Nov 202317 mins Generative AIGenerative AIMachine Learning news analysis Attackers could abuse Google's SSO integration with Windows for lateral movement By Lucian Constantin 30 Nov 20238 mins Multi-factor AuthenticationSingle Sign-onRemote Access Security feature How to maintain a solid cybersecurity posture during a natural disaster By James Careless 30 Nov 20238 mins Security Operations CenterData and Information SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI