Strategies to Modernize Ransomware Response

Data Breach Today

Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren't enough and offers practical steps for managing a ransomware response

Maintaining Momentum in Your Security Strategy

Data Breach Today

Glen Hymers of UK Cabinet Office on Keeping Communication Relevant Cybersecurity practitioners have gained the attention of corporate boards, but that attention must be converted into momentum, says Glen Hymers, head of Data Privacy and Compliance at the U.K. Cabinet Office.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

'Strategy Follows People' - How to Keep Both of Them

Data Breach Today

Marco Túlio Moraes on the Kind of Leadership That Retains Talent and Strategy In an organization, people are the ones who develop and sustain organizational strategy. Marco Túlio Moraes explores how to retain both talent and strategy

SASE: Building a Migration Strategy

Data Breach Today

Gartner Report Prompts Discussion of Keys to Success Security experts offer an analysis of Gartner's new strategic road map for SASE adoption that emphasizes the need for a detailed migration plan and offer tips for a successful rollout

What We Learned From Our Own Data-Driven ABM Strategy

ZoomInfo has created the following eBook to help other B2B organizations gain insights on how to launch their own data-driven ABM strategy. In this eBook, we will reveal the good and the bad from our own campaign and highlight some key takeaways on how to improve your ABM strategies moving forward.

The Impact of COVID-19 on Cybersecurity Strategies

Data Breach Today

Joe Nocera and Vikas Agarwal Analyze PwC Survey Findings The 2021 PwC Global Digital Trust Insights survey shows 96% of businesses will adjust their cybersecurity strategies as a result of the COVID-19 pandemic.

Strategies for Reskilling and Filling Cybersecurity Jobs

Data Breach Today

Infosys CISO Vishal Salvi on Mentoring, Online Training and Foundational Skills The gap between cybersecurity workforce demand and the number of skilled workers available to fill those jobs widened during the pandemic.

Interpol Calls For New Ransomware Mitigation Strategy

Data Breach Today

The Agency Will Elevate the Role of National Central Bureaus to Fight Cybercrimes Interpol has announced that it will boost the role of country-specific National Central Bureaus to fight ransomware and other cybercrimes.

Insights on Revamping Recovery Strategies

Data Breach Today

Experts at Dell Technologies and Unisys Discuss Current Threats and Best Security Practices In a joint video interview, David Finley at Dell Technologies and Andrew Peters at Unisys offer insights on enterprise strategies for disaster recovery and cyber recovery in light of emerging threats

The 3 Fundamentals of Building an Effective IoMT Security Strategy

Dark Reading

The high stakes and unique priorities for Internet of Medical Things devices require specialized cybersecurity strategies

2020 Database Strategies and Contact Acquisition Survey Report

As buyer expectations continue to heighten, marketing and sales teams are feeling pressured to deliver authentic messaging to buyers at every point of their customer journey. This report aims to highlight the current state of B2B database and contact acquisition strategies, and organizations’ goals to leverage data to fuel their go-to-market strategies in 2020 and beyond.

Synthetic ID Fraud: Risk Mitigation Strategies

Data Breach Today

Meridian Credit Union's Saif Nawaz on Using New Technologies As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada

Risk 208

Strategies for Fighting Synthetic ID Fraud

Data Breach Today

People’s United Bank’s Karen Boyer on Using Consumers' Devices for Authentication To mitigate the fraud risks posed by synthetic IDs, banks should use consumers' devices to help with authentication, says Karen Boyer, vice president of financial crimes and fraud intelligence at People’s United Bank, based in Connecticut.

'Zero Trust': A Strategy for Success

Data Breach Today

Panel Provides Tips on Creating a Frictionless Experience for Remote Workers An effective "zero trust" strategy requires creating a frictionless experience for the remote workforce, according to a panel of security experts, who describe the essential elements

Tips on Ransomware Defense Strategies

Data Breach Today

Caleb Barlow, CEO of CynergisTek, on Addressing the Challenges Healthcare institutions and nonprofits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up defenses

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Australia to Update National Cybersecurity Strategy

Data Breach Today

Government Invites Feedback on Addressing Cyber Challenges The Australian government is looking to update its national cybersecurity strategy by 2020. In preparation, it's released a discussion paper that seeks input from citizens, the business community, academics and other stakeholders

Strategies for Securing Digital Transformation

Data Breach Today

PJ Maloney of DXC Technology and William "Buck" Houston of Micro Focus Global Alliances weigh in on new strategies for securing the transformation PJ Maloney and William 'Buck' Houston on Steps to Bolster Cyber Defense Digital transformation is the buzz across all sectors, but it poses significant security risks to enterprises.

Tips on Building a Robust Data Backup Strategy

Data Breach Today

In light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic.

High-Profile Breaches Are Shifting Enterprise Security Strategy

Dark Reading

Increased media attention is driving changes in enterprise security strategy -- some positive, some negative

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. However, there’s no team better suited to lead that charge than the marketing department.

Fileless Malware: What Mitigation Strategies Are Effective?

Data Breach Today

Security Practitioners Highlight Ways to Fight Against the Threat As the threat of fileless malware continues to persist worldwide, security professionals are devising targeted risk management strategies

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Ransomware? I think you may have heard of it, isn’t the news full of it? Well, the stats are even scarier with over 50% increase in ransomware attacks in 2021, compared to 2020.

Access 174

UK: New National Strategy for Health Data

DLA Piper Privacy Matters

The UK’s Department for Health and Social Care (“ DHSC ”) has published a major strategy document (‘ Data saves lives: reshaping health and social care with data ’) outlining the government’s plans for the regulation and use of data in healthcare. Author: James Clark.

5 Best Practices for Building Your Data Loss Prevention Strategy

Dark Reading

The entire security team should share in the responsibility to secure sensitive data

Best Practices for Accelerating the Sales Process

This eBook takes a look at three headache-free strategies you can employ today to accelerate selling the right way. Read on to learn how to adopt specific workflows and approaches that append your existing processes to deliver value to your prospects and internal counterparts.

GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategy

The Last Watchdog

Following these steps will help you lay the foundation for a secure and sustainable cloud strategy. Migrating to and utilizing cloud environments – public, hybrid, or multi – is a source of real investment and positive change for businesses. Cloud is the powerhouse that drives digital organizations. Related: Cloud security frameworks take hold. Gartner predicts that spending on public cloud alone is set to top $500 billion in 2022 – a 20% growth over last year.

Cloud 136

How to prioritize data strategy investments as a CDO

IBM Big Data Hub

My first task as a Chief Data Officer (CDO) is to implement a data strategy. Over the past 15 years, I’ve learned that an effective data strategy enables the enterprise’s business strategy and is critical to elevate the role of a CDO from the backroom to the boardroom.

'Five Eyes' Intelligence Agencies Discuss Strategies

Data Breach Today

The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk

Building an Effective Ransomware Mitigation Strategy

Data Breach Today

Crowdstrike's Jennifer Ayers on Understanding the Indicators of Attacks To mitigate the risks posed by ransomware attacks, enterprises need to move from file-based security to a behavior-based approach, says Jennifer Ayers, vice president of the OverWatch division of Crowdstrike

The Modern Customer Success Playbook

The evolution of every high-functioning, effective customer success strategy centers around three C’s: connected experiences, an engaging customer journey, and a culture built on customer-centricity. Find out how to transform customer success teams into revenue-drivers by downloading the playbook today!

5 Objectives for Establishing an API-First Security Strategy

Dark Reading

With APIs predicted to be the most common attack vector by 2022, an API-first security strategy is critical now more than ever

National AI Strategy: The UK Government Publishes Its Artificial Intelligence Strategy for the Next Decade

Data Matters

On 22 September 2021, the UK Government (the “ Government ”) published its Artificial Intelligence (“ AI ”) strategy. This post highlights some of the key elements from the UK AI strategy.

Deliver on your data strategy with a data fabric

IBM Big Data Hub

When it comes to selecting an architecture that complements and enhances your data strategy, a data fabric has become an increasingly hot topic among data leaders. My goal was to implement a data strategy and architecture that gave appropriate users access to data.

Japan's IoT Security Strategy: Break Into Devices

Data Breach Today

Nation to Allow Researchers to Brute-Force 200 Million Devices Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners

IoT 180

A Proven Guide to Recruiting Passive Candidates

It's not efficient to be in active recruitment mode all the time. It's important to also invest in building a passive candidate pipeline. Download the guide to help you build a recruitment strategy that attracts both active and passive candidates.

Patch Management as a Risk Management Strategy

Data Breach Today

Chris Hallenbeck of Tanium Discusses Good Security Hygiene Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential

Risk 162

Enterprise Cybersecurity Strategies Are Getting More Attention

Dark Reading

Data in Dark Reading's 2021 Strategic Security Survey report suggest organizations are taking the security challenge seriously

How to Develop a Metadata Strategy

AIIM

What’s the Importance of a Metadata Strategy? To avoid this, organizations should develop a metadata strategy. Many organizations use metadata in ways that provide significant business value. Every system uses metadata to store and retrieve data.

A Comprehensive Backup Strategy Includes SaaS Data, Source Code

Dark Reading

This Tech Tip describes how organizations should expand their backup strategies Backups aren't just limited to hard drives, databases and servers.

67

Data-Driven Marketing 101

This eBook highlights how data-driven strategies empower marketing campaigns through personalization tactics.