featureHow to maintain a solid cybersecurity posture during a natural disasterFire, flood, eathquake, hurricane, tornado: natural disasters are becoming more prevalent and they’re a threat to cybersecurity that isn’t always on a company’s radar. Here are some ways to prepare for the worst.By James Careless30 Nov 20238 minsSecurity Operations CenterData and Information SecuritySecurity Practices news NetRise releases Trace solution with AI-powered semantic search aimed at protecting firmwareBy Andrew Flynn09 Nov 20233 minsInternet SecuritySecurity Monitoring SoftwareSecurity Practicesfeature Secure from the get-go: top challenges in implementing shift-left cybersecurity approachesBy Mary K. Pratt07 Nov 202312 minsDevSecOpsSecurity PracticesSecurity Infrastructure newsFIDO Alliance certifies security of edge nodes, IoT devices By Michael Hill 27 Sep 20233 minsCertificationsInternet SecuritySecurity Hardware featureWhat’s a cyber incident response retainer and why do you need one?By Linda Rosencrance 27 Sep 20238 minsCyberattacksIncident ResponseSecurity Practices opinionViews of a hot cyberwar -- the Ukrainian perspective on Russia's online assaultBy Christopher Burgess 04 Apr 20235 minsData and Information SecuritySecurity InfrastructureSecurity Practices opinionTransparency and policy shapes Cloudflare's Kiwi Farms decisionsBy Christopher Burgess 06 Sep 20225 minsSecurity InfrastructureSecurity news analysisNIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessmentBy Cynthia Brumfield 18 Aug 20228 minsIT Governance FrameworksSecurity Infrastructure newsSnowflake offers cybersecurity data platform with security app integrationsBy Shweta Sharma 09 Jun 20223 minsData WarehousingSecurity InfrastructureCloud Computing Articlesfeature7 best practices for working with cybersecurity startupsSecurity startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.By Maria Korolov 09 Oct 2018 9 minsRisk ManagementSecurity InfrastructureSecurityreviewsBruce Schneier’s Click Here to Kill Everybody reveals the looming cybersecurity crisisBook review: A sobering look at how everything is broken and nobody wants to fix itBy J.M. Porup 03 Oct 2018 8 minsCyberattacksSecurity InfrastructureSecuritynews analysisHacking smart buildingsForget about internet-connected toasters. Your "intelligent" office building is one giant, vulnerable IoT device.By J.M. Porup 05 Sep 2018 7 minsInternet of ThingsPhysical SecuritySecurity Infrastructure Show more Show less View all Resources whitepaper Test & Learn - The ultimate guide to delivering high quality, high impact products This year, the Progressive Delivery and Experimentation Summit, brought together nearly 1500 professionals. Leaders from Product, Engineering, and Data presented frameworks for adapting software development and delivery practices The post Test & Learn – The ultimate guide to delivering high quality, high impact products appeared first on Whitepaper Repository. By Optimizely 18 Sep 2023Business OperationsFinance and Accounting SystemsMarketing Software whitepaper Modernize and Scale on AWS By Koan 22 Aug 2023Amazon Web ServicesCloud ManagementIT Management whitepaper The Total Economic Impact(TM) Of Optimizely Digital Experience Platform By Optimizely 06 Aug 2023Business OperationsFinance and Accounting SystemsMarketing Software View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK CSO 30 Awards 2023 winners announced By Romy Tuin 05 Dec 20234 mins CSO and CISOC-SuiteRoles news analysis Deepfakes emerge as a top security threat ahead of the 2024 US election By Cynthia Brumfield 05 Dec 20237 mins Election HackingGovernmentSecurity Practices feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte 05 Dec 202312 mins Advanced Persistent ThreatsThreat and Vulnerability ManagementRisk Management podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO