Latest Resources – Page 7
-
Video
Engaging the board: How your board can be ready for crisis
Engaging the board is an ongoing challenge in cyber security for a variety of reasons: what seems like a uniquely technical issue is actually a complex business risk present across different business functions.
-
Video
Best Practice for Incident Response
Effective incident response is a key component of being able to contain and respond to a breach.
-
Video
Building Your Security Dream Team
How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?
-
Video
The Evolving Security Landscape - Trends to Expect in 2021 and Beyond
What is the current state of cybercrime and what are the common types of incidents being reported?
-
ebook
Rethinking Data Protection: The Human-centric Approach
The truth about traditional data security. Traditional cybersecurity was hinged on event-centric responses: Build a wall at the perimeter, control what passes in and out through that wall, and respond when something suspicious happens.
-
ebook
Nine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security.
-
Webinar
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
ebook
Four Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.
-
ebook
Tackling Data Security and Compliance Challenges
Three questions every CIO should ask about their data storage security.
-
ebook
Ransomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
Webinar
A Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Webinar
A New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
-
ebook
Ransomware Protection with Pure Storage and Commvault
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason.
-
ebook
The Habits of Highly Data-Secure Companies
New IDG survey reveals three technologies that are helping enterprises build immunity to data breaches, in and out of the cloud.
-
Webinar
Cyber AI: Supporting Privacy-First Security & Data Compliance
Data privacy is critical in increasingly digitized business environments, where the workforce is dispersed and dynamic, and relies on collaboration platforms, smart devices, and cloud computing.
-
Webinar
Solving Your Number One Security Risk
Email has played a growing role in digital transformation during the COVID-19 pandemic, as organisations continue to support large-scale remote working. But it has also introduced risk of accidental and intentional data leakage.
-
Webinar
Prevent Costly Breaches in a Safe and Compliant Way
With so many communications exchanged daily, it’s not a question of whether a mistake will occur, but how often.
-
ebook
How to strengthen information security with data discovery
Today, every company is a data company. Every business, no matter which sector it claims to be in, is producing extraordinary amounts of data which is growing in size every day. We are all operating in the information age and data has become the most valuable commodity a business owns. There’s so much value locked away within it.
-
ebook
Improved Ransomware Recoverability with SafeMode on FlashBlade
One of the biggest challenges in the growing digital economy is the exponential rise in ransomware attacks. Consequences can be dire: pay perpetrators to (they claim) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups. With millions of dollars spent annually to guard entry points ...