How Can K-12 Schools Defend Against Ransomware?

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not ...

5 Essential ITDR Steps CISOs Must Know

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity ...

How to Build a Strong ITDR Strategy

How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at ...
Sentra recovery Synthetic Data Cave

7 Key Benefits of a Cloud Disaster Recovery Strategy

A man-made or natural disaster can happen at any time, potentially putting your business in jeopardy. This is why it is imperative to ensure that your digital assets are backed up and ...
Security Boulevard
UnitedHealth ransomware health care

Ransomware: Protect Your Data Backups, Too

Ransomware continues to be a growing and increasingly dangerous threat to businesses. The numbers are ominous: Every 11 seconds a business experiences a ransomware attack, according to current research from Veeam. Most ...
Security Boulevard

Operational Resilience: More than Disaster Recovery

To contend with the explosion of cybercrime and its impact on business operations, many organizations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines ...
Incident Response Vs. Disaster Recovery: What’s The Difference and Which Do You Need?

Incident Response Vs. Disaster Recovery: What’s The Difference and Which Do You Need?

When a business has a disaster, its recovery falls into two categories: incident response and disaster recovery. This blog offers an overview of the most important aspects of each, as well as ...

Identity Threat Response with Brian Desmond

Identity threat response—the initial aspect of ITDR—is gaining importance as cyberattackers continue to find new ways into victims’ environments. I recently spoke with Brian Desmond, Principal at Ravenswood Technology Group, about his ...
CISA security tools Microsoft 365 Google

DRaaS Leads Companies Into the World of Cloud

As more and more large enterprises adopt cloud technologies, there are still many small- and medium-sized companies that have yet to take that leap. There are economic incentives that make the movement ...
Security Boulevard
FAIL: Los Angeles School District Loses 500GB of PII

FAIL: Los Angeles School District Loses 500GB of PII

The Los Angeles Unified School District has lost control of a huge cache of sensitive data because its superintendent, Alberto M. Carvalho, refused to pay the ransom ...
Security Boulevard