newsACSC and CISA launch step-by-step business continuity instructions for SMBsBusiness Continuity in a Box is a set of instructions to help businesses maintain communications and continuity of critical applications following a cyber incident.By Samira SarrafNov 13, 20233 minsCyberattacksBusiness Continuity news CYGNVS exits stealth, trumpeting its cyberattack recovery platformBy Jon GoldJan 24, 20233 minsBackup and RecoveryBusiness Continuitynews Kyndryl launches recovery retainer service for cyberattack responseBy Jon GoldJul 25, 20222 minsBackup and RecoveryBusiness Continuity newsKyndryl rolls out Dell partnership for disaster recovery and securityBy Jon Gold Apr 14, 20223 minsBackup and RecoveryBusiness Continuity feature12 steps to take when there's an active adversary on your networkBy Mary K. Pratt Jan 27, 20229 minsCSO and CISOIncident ResponseBusiness Continuity featureFSU's university-wide resiliency program focuses on doing the basics betterBy Mary K. Pratt Oct 07, 20217 minsCSO and CISOBusiness ContinuityRisk Management how-toTabletop exercise scenarios: 3 real-world examplesBy Josh Fruhlinger and Sarah D. Scalet Jun 30, 202115 minsRansomwarePhishingDisaster Recovery featureBusiness continuity and disaster recovery planning: The basicsBy Neal Weinberg Mar 25, 20219 minsDisaster RecoveryBusiness ContinuitySecurity feature7 critical IT policies you should have in placeBy Bob Violino Mar 16, 20217 minsInternet SecurityDisaster RecoveryIT Strategy ArticlesnewsSalted Hash Ep 24: Defending against mobile threatsWe're back from hiatus! In this week's post, Salted Hash heads to the RSA Conference in San FranciscoBy Steve Ragan May 01, 2018 2 minsHackingMalwareMobile SecuritynewsTwo incident response phases most organizations get wrongIt's important to remember: Incident response isn't a thing, it's a process.By Steve Ragan Apr 19, 2018 6 minsInvestigation and ForensicsDisaster RecoveryIT StrategynewsSamSam explained: Everything you need to know about this opportunistic group of threat actorsThe group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.By Steve Ragan Apr 18, 2018 11 minsAdvanced Persistent ThreatsRansomwareHackingnewsCustomers describe the impact of the Allscripts ransomware attackThere were three victims during the SamSam ransomware attack against Allscripts — the company, its customers, and the patients those customers serve.By Steve Ragan Apr 17, 2018 10 minsData BreachRansomwareHealthcare IndustrynewsRansomware, healthcare and incident response: Lessons from the Allscripts attackThe actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.By Steve Ragan Apr 16, 2018 11 minsData BreachRansomwareHealthcare IndustrynewsAllscripts: Ransomware, recovery, and frustrated customersSalted Hash will be running a series this week, but Insiders can read the entire series today.By Steve Ragan Apr 15, 2018 1 minRansomwareBusiness ContinuityCybercrimenewsSamSam group deletes Atlanta’s contact portal after the address goes publicAfter the portal's address was shared with local media and broadcast to the public, the actors behind the Atlanta attacks deleted it rather than deal with questions and commentsBy Steve Ragan Mar 27, 2018 6 minsRansomwareHackingMalwarenewsSamSam ransomware attacks have earned nearly $850,000Since December 2017, the group behind SamSam has continued to collect ransom payments from victims in healthcare, education and governmentBy Steve Ragan Mar 23, 2018 6 minsRansomwareMalwareBackup and RecoveryopinionWhy we continue to fail: lessons learned from the Atlanta Airport fiascoFive basic failures happened that make the Atlanta airport a softer target for future attack.By Thomas Trent Jan 02, 2018 5 minsTechnology IndustryCyberattacksDisaster RecoveryfeatureWhy incident response is the best cybersecurity ROIFormer White House CIO Theresa Payton says unexpected breaches can wreak havoc on a company's bottom line. Proper IR planning can mitigate damage costs.By Steve Morgan Dec 18, 2017 6 minsData BreachCyberattacksHackingopinionReliability vs. redundancy: aren't they the same thing?Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.By Bret Piatt Dec 08, 2017 5 minsTechnology IndustryDisaster RecoveryBusiness ContinuitynewsThe best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacksIf one financial services firm cyber destructs, then another one takes over.By Steve Morgan Dec 05, 2017 4 minsData BreachInternet SecurityBackup and Recovery Show more Show less View all Resources whitepaper SEEK Asia's Video Content Unlocks Career Potential SEEK, Asia owns a number of recruitment sites, but they do much more than help people find jobs. The post SEEK Asia's Video Content Unlocks Career Potential appeared first on Whitepaper Repository. By Brightcove 07 Nov 2023Business ContinuityBusiness OperationsBusiness Services whitepaper More Power. Less Space. By CyberPower 20 Oct 2023Business ContinuityBusiness OperationsBusiness Services whitepaper Build vs. Buy: What Bootstrapping Costs Your Business By Vercel 13 Oct 2023Application Performance ManagementBusiness ContinuitySystem Integration View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. Feb 19, 2018 RansomwareBackup and RecoveryBusiness Continuity See all videos Show me morePopularArticlesPodcastsVideos news Amazon debuts biometric security device, updates Detective and GuardDuty By Jon Gold Nov 29, 20233 mins BiometricsSecurity Monitoring SoftwareThreat and Vulnerability Management news Almost all developers are using AI despite security concerns, survey suggests By John Mello Jr. Nov 29, 20234 mins Development ToolsSecurity PracticesSupply Chain news FBI probes Pennsylvanian water utility hack by pro-Iran group By Shweta Sharma Nov 29, 20234 mins CyberattacksUtilities Industry podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI