Disaster Recovery Steps Up With New Cisco NERVs

Disaster Recovery Steps Up With New Cisco NERVs

As hurricane season in the southern United States hits its stride and damage from the first storm of the season is cleared, government agencies at all levels are continuing their preparations for the months ahead. Meanwhile, deadly tornado outbreaks continue to sweep across the middle of the United States, leaving many communities without basic government services. As disaster recovery efforts continue for these and other weather events, one thing is clear; the damage to infrastructure…

Read More

Anjanette Hebert | Women in Security 2024

Anjanette Hebert | Women in Security 2024

Protecting your community during a disaster Anjanette Hebert was born and raised in Louisiana. Her first security job was as a mall security officer, until she moved into private investigations before eventually settling as a hospital security officer. “It didn’t take me long to figure out that I really enjoyed it; I felt like that was my place. I ended up staying in that organization for 28 years. In 2002, I took on the role…

Read More

5 tips for cybersecurity insurance compliance

5 tips for cybersecurity insurance compliance

5 tips for cybersecurity insurance compliance | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

The keys to data resilience: Hindsight, foresight and preparing for the unexpected

The keys to data resilience: Hindsight, foresight and preparing for the unexpected

The keys to data resilience: Hindsight, foresight and preparing for the unexpected | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Bouncing back after a cyberattack: A cyber resilience checklist

Bouncing back after a cyberattack: A cyber resilience checklist

Bouncing back after a cyberattack: A cyber resilience checklist | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Enterprise incident response plans must improve

Enterprise incident response plans must improve

Enterprise incident response plans must improve | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Preparing for the unexpected: 5 benefits of cloud disaster recovery

Preparing for the unexpected: 5 benefits of cloud disaster recovery

<!– Preparing for the unexpected: 5 benefits of cloud disaster recovery | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

93% of orgs have suffered a data-related business disruption

93% of orgs have suffered a data-related business disruption

<!– 93% of orgs have suffered a data-related business disruption | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Toyota halts production after cyberattack on supplier

Toyota halts production after cyberattack on supplier

Toyota halts production after cyberattack on supplier | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2