Please turn on your JavaScript for this page to function normally.
build
How can organizations bridge the gap between DR and cybersecurity?

Breaking down the silos between disaster recovery (DR) and cybersecurity has become increasingly important to ensure maximum business resiliency against outages, data …

network
Ignoring network automation is a ticking time bomb for security

IT professionals are frustrated due to the rise in network update velocity and tech stack sprawl, lack of support from leadership, and disagreements and concerns about the …

data
Data backup is no longer just about operational fallback

Data backup has traditionally been in the operational domain of IT, while security teams have been responsible for threats to data from attacks. As these attacks have become …

organize
How to start planning for disaster recovery

There is a famous quote I often think about at 3am on a Sunday morning as I am working with a client to recover from a large-scale cybersecurity incident: “Fail to prepare, …

hands
How cloud PCs act as an insurance plan for ransomware recovery

Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention …

hands
Cybersecurity recovery is a process that starts long before a cyberattack occurs

While most organizations have insurance in case of cyberattacks, the premium they pay depends on how the business identifies, detects and responds to these attacks – and …

lock
Are your cybersecurity investments making you less resilient?

In the past decade, digital transformation has become a buzzword in nearly every industry. Organizations have scaled down workforces in favor of automation, moved their …

arrows
The key differences between a business continuity plan and a disaster recovery plan

In this Help Net Security video, Chip Gibbons, CISO at Thrive, illustrates the differences between a business continuity plan and a disaster recovery plan. While these terms …

burn
Outdated infrastructure remains a problem against sophisticated cyberattacks

A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …

Cloud
Increased security driving investments in cloud computing

Aptum has announced a report which examines the complexities inherent in hybrid cloud environments and their implications on security, data governance, compliance and disaster …

organize
Recovery and resilience: CISO insights into the 2022 cybersecurity landscape

I recently had the opportunity to meet and speak with several luminaries of the global security ecosystem: Roger Hale – Chief Security Officer at Agora; Sounil Yu …

organize
79% of organizations have activated a disaster recovery response within the past 12 months

Zerto recently commissioned IDC to conduct a major ransomware and disaster preparedness survey, which revealed that 79% of respondents have activated a disaster recovery (DR) …

Don't miss

Cybersecurity news