Let’s say you are the CISO or IT security lead of your organization, and your incident response program needs an uplift. After making a compelling business case to management for…
Browsing Categoryincident response tools
What Drives Incident Responders: Key Findings from the 2022 Incident Responder Study
Cyberattacks seldom happen when it’s convenient. In fact, it’s relatively common for them to occur on weekends or holidays — threat actors capitalize on the fact that there is fewer…
Solving the Data Problem Within Incident Response
One of the underappreciated aspects of incident response (IR) is that it often starts as a data problem. In many cases, IR teams are presented with an effect such as…
Cyber Warfare: What To Expect in 2022
Cyberwarfare is not a future threat—it’s a clear and present danger. While the concept of cyber terrorism might sound like something from a fictional movie, our interconnected world is riddled…
A Journey in Organizational Resilience: The Data Life Cycle
With so many efforts focused on restoring systems, applications and workloads, it is easy to miss an important piece: the data that makes business processes possible. A fully restored system…
What Is Customer Identity Access Management (CIAM)?
Customer identity access management (CIAM) solutions enable companies to manage more than just customer information. CIAM makes it possible to manage data-sharing consent, self-service customer registration, account management, single sign-on…
A Journey in Organizational Cyber Resilience Part 2: Business Continuity
Keeping a business up and running during a problem takes the right people for the job. When it comes to cyber resilience through tough times, many things come down to…