featureHow to maintain a solid cybersecurity posture during a natural disasterFire, flood, eathquake, hurricane, tornado: natural disasters are becoming more prevalent and they’re a threat to cybersecurity that isn’t always on a company’s radar. Here are some ways to prepare for the worst.By James Careless30 Nov 20238 minsSecurity Operations CenterData and Information SecuritySecurity Practices news NetRise releases Trace solution with AI-powered semantic search aimed at protecting firmwareBy Andrew Flynn09 Nov 20233 minsInternet SecuritySecurity Monitoring SoftwareSecurity Practicesfeature Secure from the get-go: top challenges in implementing shift-left cybersecurity approachesBy Mary K. Pratt07 Nov 202312 minsDevSecOpsSecurity PracticesSecurity Infrastructure newsFIDO Alliance certifies security of edge nodes, IoT devices By Michael Hill 27 Sep 20233 minsCertificationsInternet SecuritySecurity Hardware featureWhat’s a cyber incident response retainer and why do you need one?By Linda Rosencrance 27 Sep 20238 minsCyberattacksIncident ResponseSecurity Practices opinionViews of a hot cyberwar -- the Ukrainian perspective on Russia's online assaultBy Christopher Burgess 04 Apr 20235 minsData and Information SecuritySecurity InfrastructureSecurity Practices opinionTransparency and policy shapes Cloudflare's Kiwi Farms decisionsBy Christopher Burgess 06 Sep 20225 minsSecurity InfrastructureSecurity news analysisNIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessmentBy Cynthia Brumfield 18 Aug 20228 minsIT Governance FrameworksSecurity Infrastructure newsSnowflake offers cybersecurity data platform with security app integrationsBy Shweta Sharma 09 Jun 20223 minsData WarehousingSecurity InfrastructureCloud Computing ArticlesfeatureIs your security operations center TTP0?The new TTP0 community wants to do for SOCs what OWASP has done for web security. It will help CISOs improve their threat intelligence and threat hunting capabilities as well. By Roger Grimes 31 Oct 2018 6 minsSecurity InfrastructureSecurityfeature7 best practices for working with cybersecurity startupsSecurity startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.By Maria Korolov 09 Oct 2018 9 minsRisk ManagementSecurity InfrastructureSecurityreviewsBruce Schneier’s Click Here to Kill Everybody reveals the looming cybersecurity crisisBook review: A sobering look at how everything is broken and nobody wants to fix itBy J.M. Porup 03 Oct 2018 8 minsCyberattacksSecurity InfrastructureSecuritynews analysisHacking smart buildingsForget about internet-connected toasters. Your "intelligent" office building is one giant, vulnerable IoT device.By J.M. Porup 05 Sep 2018 7 minsInternet of ThingsPhysical SecuritySecurity Infrastructure Show more Show less View all Resources whitepaper Magic Quadrant for Distributed File Systems and Object Storage This Gartner Magic Quadrant research assesses the vision and execution of vendors in this market, and Dell Technologies, for the 7th consecutively year is ranked as a leader in the Magic Quadrant. The post Magic Quadrant for Distributed File Systems and Object Storage appeared first on Whitepaper Repository. By Dell Technologies and Intel(R) 24 Feb 2023Business ContinuityDigital TransformationEnterprise Storage whitepaper Top Reasons Why Customers Choose Dell VxRail By Dell Technologies Solutions and Intel(R) 24 Feb 2023Digital TransformationHyperconverged InfrastructureSoftware Development View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis Attackers breach US government agencies through ColdFusion flaw By Lucian Constantin 06 Dec 20235 mins Advanced Persistent ThreatsAdvanced Persistent ThreatsAdvanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology By John P. Mello Jr. 06 Dec 20234 mins Application SecurityNetwork Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey By Gagandeep Kaur 06 Dec 20234 mins IT JobsSecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO