newsCounting the cost of CrowdStrike: the bug that bit billionsCyber insurance coverage is set to cover only a fraction of the losses, leaving affected businesses to grapple with substantial uncovered expenses.By Shweta Sharma26 Jul 20241 minBusiness ContinuityEndpoint Protection feature CrowdStrike failure: What you need to knowBy CIO staff23 Jul 20247 minsTechnology IndustryIncident ResponseBusiness Continuityfeature 5 critical IT policies every organization should have in placeBy Bob Violino22 Jul 20247 minsInternet SecurityDisaster RecoveryIT Strategy how-toTabletop exercise scenarios: 10 tips, 6 examplesBy Josh Fruhlinger and Sarah D. Scalet 04 Jul 202416 minsRansomwarePhishingDisaster Recovery newsACSC and CISA launch step-by-step business continuity instructions for SMBsBy Samira Sarraf 13 Nov 20233 minsCyberattacksBusiness Continuity newsCYGNVS exits stealth, trumpeting its cyberattack recovery platformBy Jon Gold 24 Jan 20233 minsBackup and RecoveryBusiness Continuity opinionHow do we build digitally resilient organizations?By Debbie Garside 04 Sep 20185 minsBackup and RecoveryBusiness ContinuityDisaster Recovery opinionAre you prepared for hurricane season? Disaster recovery and business continuity plan best practicesBy George Grachis 16 Aug 20187 minsDisaster RecoveryBusiness ContinuityData Center opinionDigital resilience – a step up from cybersecurityBy Debbie Garside 01 Aug 20184 minsBusiness ContinuityDisaster RecoveryRisk Management ArticlesopinionThe 3 hidden costs of incident responseEvery business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.By Druce MacFarlane 10 May 2018 5 minsData BreachInvestigation and ForensicsDisaster RecoverynewsSalted Hash Ep 24: Defending against mobile threatsWe're back from hiatus! In this week's post, Salted Hash heads to the RSA Conference in San FranciscoBy Steve Ragan 01 May 2018 2 minsHackingMalwareMobile SecuritynewsTwo incident response phases most organizations get wrongIt's important to remember: Incident response isn't a thing, it's a process.By Steve Ragan 19 Apr 2018 6 minsInvestigation and ForensicsDisaster RecoveryIT StrategynewsSamSam explained: Everything you need to know about this opportunistic group of threat actorsThe group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.By Steve Ragan 18 Apr 2018 11 minsAdvanced Persistent ThreatsRansomwareHackingnewsCustomers describe the impact of the Allscripts ransomware attackThere were three victims during the SamSam ransomware attack against Allscripts — the company, its customers, and the patients those customers serve.By Steve Ragan 17 Apr 2018 10 minsData BreachRansomwareHealthcare IndustrynewsRansomware, healthcare and incident response: Lessons from the Allscripts attackThe actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.By Steve Ragan 16 Apr 2018 11 minsData BreachRansomwareHealthcare IndustrynewsAllscripts: Ransomware, recovery, and frustrated customersSalted Hash will be running a series this week, but Insiders can read the entire series today.By Steve Ragan 15 Apr 2018 1 minRansomwareBusiness ContinuityCybercrimenewsSamSam group deletes Atlanta’s contact portal after the address goes publicAfter the portal's address was shared with local media and broadcast to the public, the actors behind the Atlanta attacks deleted it rather than deal with questions and commentsBy Steve Ragan 27 Mar 2018 6 minsRansomwareHackingMalwarenewsSamSam ransomware attacks have earned nearly $850,000Since December 2017, the group behind SamSam has continued to collect ransom payments from victims in healthcare, education and governmentBy Steve Ragan 23 Mar 2018 6 minsRansomwareMalwareBackup and RecoveryopinionWhy we continue to fail: lessons learned from the Atlanta Airport fiascoFive basic failures happened that make the Atlanta airport a softer target for future attack.By Thomas Trent 02 Jan 2018 5 minsTechnology IndustryCyberattacksDisaster RecoveryfeatureWhy incident response is the best cybersecurity ROIFormer White House CIO Theresa Payton says unexpected breaches can wreak havoc on a company's bottom line. Proper IR planning can mitigate damage costs.By Steve Morgan 18 Dec 2017 6 minsData BreachCyberattacksHackingopinionReliability vs. redundancy: aren’t they the same thing?Business continuity planning assumptions are changing the way companies recover from impact scenarios and minimize the disruption to daily business activities.By Bret Piatt 08 Dec 2017 5 minsTechnology IndustryDisaster RecoveryBusiness Continuity Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 08 Nov 2024Business OperationsCybercrimeData and Information Security whitepaper Global Cyber Resilience Report 2024 By Cohesity Inc. 08 Nov 2024Business OperationsData and Information SecurityRansomware whitepaper Global Data Insights Survey By Digital Realty Trust, L.P. 25 Oct 2024Artificial IntelligenceBusiness OperationsEnterprise View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. 19 Feb 2018 RansomwareBackup and RecoveryBusiness Continuity See all videos Show me morePopularArticlesPodcastsVideos news Androxgh0st botnet integrates Mozi payloads to target IoT devices By Lucian Constantin 08 Nov 20245 mins BotnetsThreat and Vulnerability ManagementVulnerabilities news US consumer protection agency bans employee mobile calls amid Chinese hack fears By Gyana Swain 08 Nov 20244 mins Hacking opinion Choosing AI: the 7 categories cybersecurity decision-makers need to understand By Christopher Whyte 08 Nov 202410 mins CSO and CISOSecurity PracticesSecurity Software podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Supply ChainCritical InfrastructureSecurity video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI