5 Essential ITDR Steps CISOs Must Know

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity ...

How to Build a Strong ITDR Strategy

How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at ...
recovery Synthetic Data Cave

7 Key Benefits of a Cloud Disaster Recovery Strategy

A man-made or natural disaster can happen at any time, potentially putting your business in jeopardy. This is why it is imperative to ensure that your digital assets are backed up and ...
Security Boulevard
backup, data room data clean visualization data cybersecurity Edge data center privacy Unisys

Ransomware: Protect Your Data Backups, Too

Ransomware continues to be a growing and increasingly dangerous threat to businesses. The numbers are ominous: Every 11 seconds a business experiences a ransomware attack, according to current research from Veeam. Most ...
Security Boulevard

Operational Resilience: More than Disaster Recovery

To contend with the explosion of cybercrime and its impact on business operations, many organizations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines ...
Incident Response Vs. Disaster Recovery: What’s The Difference and Which Do You Need?

Incident Response Vs. Disaster Recovery: What’s The Difference and Which Do You Need?

When a business has a disaster, its recovery falls into two categories: incident response and disaster recovery. This blog offers an overview of the most important aspects of each, as well as ...

Identity Threat Response with Brian Desmond

Identity threat response—the initial aspect of ITDR—is gaining importance as cyberattackers continue to find new ways into victims’ environments. I recently spoke with Brian Desmond, Principal at Ravenswood Technology Group, about his ...
DRaaS third-party risk cloud Axis Security cloud ransomware Splunk investment cloud security

DRaaS Leads Companies Into the World of Cloud

As more and more large enterprises adopt cloud technologies, there are still many small- and medium-sized companies that have yet to take that leap. There are economic incentives that make the movement ...
Security Boulevard
FAIL: Los Angeles School District Loses 500GB of PII

FAIL: Los Angeles School District Loses 500GB of PII

The Los Angeles Unified School District has lost control of a huge cache of sensitive data because its superintendent, Alberto M. Carvalho, refused to pay the ransom ...
Security Boulevard

Protecting Healthcare Organizations from Ransomware Attacks

Active Directory has been a top cybersecurity tool for more than two decades. The problem with protecting AD—used by roughly 90% of the Fortune 1000 companies—from ransomware attacks is simply that it ...