Disaster recovery solutions make it easy for administrators to prevent data loss caused by failure events or ransomware, even when they cannot be on-site.
Applying the Sun Tzu approach to cybersecurity gives organizations the awareness of what to look for, what vulnerabilities create the most risk and how to implement the appropriate incident response procedures.
How do you find, hire and create the perfect threat hunter team? Troy Gill, Manager of Security Research and Zix’s AppRiver Threat Research Team, speaks to what it takes to be an exceptional threat hunter and what qualities they need to be successful.
Sumo Logic research reports that 56% of companies with more than 10,000 employees receive more than 1,000 security alerts every day, and 93% say they cannot address all alerts the same day. Cybercriminals are also aware of alert fatigue and count on IT to ignore many security alerts. So, what can you do?
The volume of cyber intrusion activity globally jumped 125% in the first half of 2021 compared with the same period last year, according to the Cyber Investigations, Forensics & Response (CIFR) mid-year update from Accenture.
Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic, taking over the recently-restructured Office of Emergency Management (OEM) in order to coordinate the University’s efforts to prepare for, respond to, and recover from emergencies.
Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic struck with the goal of providing a robust framework for the University to prepare for, respond to, and recover from emergencies. Barbiere and the newly restructured Office of Emergency Management put together a framework to streamline and organize emergency and pandemic response to continue operations no matter the cause of disruption.
The Cybersecurity and Infrastructure Security Agency (CISA), in coordination with the National Association of Secretaries of State (NASS) and the National Association of State Election Directors (NASED), hosted the nation’s annual election security exercise last week, bringing together federal, state, local, and private sector partners for the fourth annual Tabletop the Vote. More than 1,000 participants ran through hypothetical scenarios affecting election operations to share practices around cyber and physical incident planning, preparedness, identification, response, and recovery.
If done right, red teams put an organization’s security controls, policies, response and training to the test using the tactics, techniques and procedures (TTPs) of real-world adversaries, providing value to any security program.
Red teams put an organization’s security controls, policies, response and training to the test using the tactics, techniques and procedures (TTPs) of real-world adversaries. It is an essential activity in any security program, but it only provides value if done right.