The global lessons learned from the July 19 Crowdstrike event

The global lessons learned from the July 19 Crowdstrike event

Friday, July 19th, 2024, was an unforgettable day, albeit for all the wrong reasons.  A global technical outage linked to the cybersecurity firm CrowdStrike grounded flights, crashed enterprise Windows-based systems, and underscored the fact that the dependencies within the world’s IT infrastructure are so fragile and critical that a small bug can bring it to its knees.  Despite the fact that the event’s impacts echoed the effects of a widespread ransomware attack, Crowdstrike CEO George…

Read More

Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

Monitoring multiple simultaneous or overlapping crises pose significant challenges for companies and security teams. Organizations face a myriad of potential crises that can unfold rapidly and escalate in unexpected ways. From cyber-attacks and natural disasters to supply chain disruptions, the concept of polycrisis has become a defining feature of the modern security era. The repercussions of these events can rapidly overwhelm a security or intelligence team’s ability to respond efficiently. In such times of perpetual crisis,…

Read More

Introducing Cisco XDR Playbooks: Finding the balance in automating and guiding incident response

Introducing Cisco XDR Playbooks: Finding the balance in automating and guiding incident response

Security Operations is the beating heart of any organization, a united team vigilantly standing guard against cyber threats. To outsmart their adversaries, they must delve deep into the intricate world of technology and human behavior. As they navigate these complex landscapes, they must also transition from relying on tribal knowledge and ad-hoc maneuvers to a mature, high-performing operation. The key? Embracing consistency and cultivating effective procedures. With this in mind, enter the world of Cisco…

Read More

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

60% of Australian small businesses don’t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave? The internet is a difficult space for Australian small and midsize businesses at the moment. Not only does the rate of innovation challenge them to adopt disruptive new technologies with minimal resources, but they also have to contend with the same cyber threats as all other businesses….

Read More

How mobile technologies can transform emergency response

How mobile technologies can transform emergency response

How mobile technologies can transform emergency response | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Product Spotlight on Analytics

Product Spotlight on Analytics

Product Spotlight on Analytics | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Strategic safety planning: Staying ahead of business travel threats

Strategic safety planning: Staying ahead of business travel threats

Strategic safety planning: Staying ahead of business travel threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Compliance and security are two sides of the same coin

Compliance and security are two sides of the same coin

Compliance and security are two sides of the same coin | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Alert and investigation fatigue is playing a role in employee burnout

Alert and investigation fatigue is playing a role in employee burnout

Alert and investigation fatigue is playing a role in employee burnout | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2 3 8