Insights

Business Resilience

Business Resilience is the ability to adapt quickly to risks and disruptions, while maintaining key business workflows and safeguarding employees, assets, and brand reputation.

Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.

Guide
Guide
Business Resilience: A Strategic Approach to Business Continuity
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Learn more
Master Class
Master Class
Business Resilience Management in a Pandemic Crisis 
Attend this KC Master Class to learn what actions you can take immediately to handle the current pandemic crisis. In a second stage, an in-depth course will help you bolster your business...
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Blog
Blog
Ransomware During the Pandemic Crisis
It is really astonishing how quickly the word “pandemic” has evolved from a subject of obscure computer games to the center of everyone’s daily conversations… However,...
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Webinar Recording
Webinar Recording
Accelerating Your Digital Transformation: Secure and Successful Cloud Migrations
The use of cloud services is one of the key enablers of digital transformation - accelerating time to value, providing more access to powerful IT resources in a more cost-effective manner and...
Learn more
Zero Trust Reality Check: Secure Access for Hybrid IT
Webinar Recording
Zero Trust Reality Check: Secure Access for Hybrid IT
Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the...
OpenC2 – Standards for Faster Response to Security Incidents
Blog
OpenC2 – Standards for Faster Response to Security Incidents
Recently, I came across a rather new and interesting standardization initiative, driven by the NSA (U.S. National Security Agency) and several industry organizations, both Cyber Defense software...
Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps
Webinar Recording
Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps
The biggest mistake you can make it assuming you cannot, or will never, be breached – the challenge for any company is to have a strategy that meets their risk appetite, security measures...
IBM Acquires Resilient Systems
Blog
IBM Acquires Resilient Systems
Yesterday at the RSA Conference, IBM has officially confirmed what’s already been a rumor for some time – the company is planning to acquire Resilient Systems for an undisclosed...
Avoiding Data Breaches and Managing Big Data
Blog
Avoiding Data Breaches and Managing Big Data
Today information is the foundation upon which businesses are built and organizations need to prosper.  However, given its value, information is not treated with sufficient respect by everyone in...
Data Breaches during 2012 demonstrate the need for better information stewardship
Blog
Data Breaches during 2012 demonstrate the need for better information stewardship
Was 2012 a big year for IT security breaches? Whilst I don’t have quantitative information on exactly how many data breaches there were during 2012.  However, during this period, there were...
GlobalSign interrupt their Certificate Services and ask Fox-IT to Investigate Alleged Security Breach
Blog
GlobalSign interrupt their Certificate Services and ask Fox-IT to Investigate Alleged Security Breach
Only hours after the individual/group claiming responsibility for the DigiNotar hack had posted on pastebin, that he/they have access to 4 more high profile CAs and had named GlobalSign to be...
Healing the Breach at RSA
Blog
Healing the Breach at RSA
It must have hurt: RSA, one of the world’s biggest names in IT Security, recently was forced to admit that there had been a successful attack against the “seeds” that are a part of their hallmark...
RSA SecurID breach: it had to happen...
Blog
RSA SecurID breach: it had to happen...
As you, dear reader, can imagine, the information about the SecurID breach was really shaking the minds of us analysts here - for a long time, we were telling the story that SecurID was the right...
Previous
1 2 3 4 5 6 7 8 9