2024

article thumbnail

Ticketmaster Breach May Have Exposed Millions of Users’ Data

DRI Drive

In a year where the company is already under fire from the U.S. Department of Justice and summer concert goers balking at high prices, news of a massive data breach is yet another black eye for Ticketmaster. Live Nation Entertainment, Ticketmaster’s parent company, disclosed a breach of its database to the Securities and Exchange Commission, […] The post Ticketmaster Breach May Have Exposed Millions of Users’ Data appeared first on DRI Drive.

article thumbnail

FEMA Responds to Hurricane Helene and Milton - Guest Pete Gaynor

Disaster Zone Podcast

In this podcast Pete Gaynor, the immediate past Federal Emergency Management Agency (FEMA) Administrator and Acting Secretary of Homeland Security shares what he knows about how the national disaster response system functions. The roles and responsibilities of local, state and the federal government. We also dive into some of the malicious lies being told about FEMA’s response to Hurricane Helene and Milton.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From WTF to WTAF: Navigating the New Normal

Bernstein Crisis Management

Jonathan Bernstein, Chairman and Founder From WTF to WTAF: Navigating the New Normal by Jonathan Bernstein In the past year, it seems our entire nation has crossed the line from WTF to WTAF. For the uninitiated, the “A” in WTAF stands for “Actual.” It’s a term that conveys a level of disbelief and astonishment beyond what you’d expect from just a plain old WTF.

article thumbnail

Announcing FlashArray//C20: Extending the Pure Storage Platform to Edge-optimized Capacities

Pure Storage

Announcing FlashArray//C20: Extending the Pure Storage Platform to Edge-optimized Capacities by Pure Storage Blog Summary The power of the Pure Storage platform is now available in smaller capacities. FlashArray//C20 is the newest member of the FlashArray family. The capacity-optimized all-flash system delivers enterprise-class performance, reliability, and agility at capacities and prices that are more accessible for edge deployments and smaller workloads.

Capacity 131
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Data Resilience: The Key to AI and Cybersecurity

Solutions Review

Veeam’s Rick Vanover offers insights on data resilience and the key to AI and cybersecurity. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. The current conversations in the technology landscape are being driven by coverage of two topics: AI and cybersecurity.

More Trending

article thumbnail

Nearly two decades after Hurricane Katrina swept through the Gulf Coast, what policies have changed?

National Center for Disaster Prepardness

A look at some key legislation since Hurricane Katrina. By Zayna Syed Streets that looked like canals, the Superdome surrounded by water, scores of displaced people on highway overpasses —these are some of the historic images that emerged from the floodwaters of Hurricane Katrina. As we approach the hurricane’s 19th anniversary, it is worth looking at how much Katrina has influenced emergency management and the legislation crafted in its wake.

article thumbnail

A new benchmark in easy and fast recovery after cyberattacks or data loss

Acronis

We are proud to introduce Acronis Cyber Protect 16. With its integration of advanced artificial intelligence (AI) and machine learning (ML) technologies, Acronis Cyber Protect 16 is not just reactive but proactive, capable of anticipating and neutralizing threats before they can cause damage.

Benchmark 124
article thumbnail

Application developer: Roles and responsibilities to become a successful developer

BMC

With enterprise organizations feeling the pressure to deploy applications faster and more frequently, it’s no surprise that demand for application developers is reaching an all-time high. But what exactly does an application developer do? As the name suggests, an application developer creates and tests applications designed for electronic computing devices.

article thumbnail

Learning from Major Incidents: The Opportunities We’re Missing by Nora Jones

PagerDuty

While they are untimely, stressful and likely to highlight communication breakdowns within an organization; incidents can be a powerful tool for learning and growth in organizations. When an incident occurs with a large impact, which it feels like we read about this happening in the news on a weekly basis, oftentimes the focus is on two things: stabilizing the situation, and controlling the narrative.

Outage 116
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Wargaming the Future of Climate Change

The Rand Blog

The U.S. Department of Defense describes climate change as a critical national security issue and a “threat multiplier.” A new card game can help military leaders think through how climate change might affect people, infrastructure, and military operations.

Security 111
article thumbnail

Cybersecurity Guidance for High-Risk Nonprofits on the Heels of the Latest Healthcare Breach

DRI Drive

With healthcare providers like Ascension hindered by cyberattacks, the Cybersecurity and Infrastructure Security Agency (CISA) offers guidance for these at-risk organizations. In early May, Ascension, a major U.S. healthcare network, was hit by a ransomware attack that impacted hospitals across 19 states. This forced the organization to revert to “downtime procedures” – meaning paper records […] The post Cybersecurity Guidance for High-Risk Nonprofits on the Heels of the Latest Healthcare

article thumbnail

Security Industry Association Announces Winners of the 2024 SIA New Products & Solutions Awards

Security Industry Association

IronYun took the top honor in SIA’s annual award program recognizing innovative security products in partnership with ISC West. LAS VEGAS, Nev. – The Security Industry Association (SIA) has announced the 2024 winners of the SIA New Products and Solutions (NPS) Awards , the flagship awards program presented in partnership with ISC West recognizing innovative security products, services and solutions.

Security 119
article thumbnail

Creating an organizational multi-Region failover strategy

AWS Disaster Recovery

AWS Regions provide fault isolation boundaries that prevent correlated failure and contain the impact from AWS service impairments to a single Region when they occur. You can use these fault boundaries to build multi-Region applications that consist of independent, fault-isolated replicas in each Region that limit shared fate scenarios. This allows you to build multi-Region applications and leverage a spectrum of approaches from backup and restore to pilot light to active/active to implement you

Failover 117
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld

Pure Storage

Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and we’re taking the month to spotlight resources and insights to help you improve cyber resilience and build a culture of security. This year’s theme is “ Secure Our World ,” highlighting this global need to do our part, and we all play a part in protecting data and critical assets.

article thumbnail

How you can afford Business Continuity Planning.

KingsBridge BCP

Business Continuity Planning (BCP) on a budget You know you should, customers are demanding and if you want to grow the auditors will require, but how can you afford business continuity planning with the $0 budget you’ve got? Sound familiar? Lucky for you, KingsBridgeBCP has been writing Business Continuity Plans since 1983, so we’ve seen […] The post How you can afford Business Continuity Planning. appeared first on KingsBridgeBCP.

article thumbnail

Achieving Data Immutability with Zerto

Zerto

In today’s digital landscape, data is one of the most valuable assets for any organization. Ensuring its security is paramount, especially in the face of increasing cyber threats and stringent regulatory requirements. Implementing technologies such as data immutability can help address those needs. Why is Data Immutability Important? Data immutability is a critical component for organizations to store data in a way that it cannot be altered or deleted once written.

article thumbnail

CCTV Outages and How to Report Them

Prism International

We’ve likely all been there, right? You’ve just bought a new computer or phone, made certain it was installed correctly, following every bit of instruction down to the letter. And then, you let it be, hoping this new bit of technology is just as easy as it advertises on the box. And yet, there it is–the telltale ERROR message that has you spending hours online, trying to figure out what exactly went wrong and what you need to do to fix it.

Outage 98
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Acronis True Image: A familiar name returns!

Acronis

Welcome back to Acronis True Image, a leader in digital protection for over 20 years, trusted by over 5.5 million users globally. With a history of preventing more than one million cyberattacks, Acronis True Image stands as a legacy of reliable and secure personal data protection.

Security 116
article thumbnail

The chief information security officer (CISO) role explained

BMC

Information security is a top concern for business organizations, as research finds that cyber-attacks are launched 2,244 times a day—that’s every 39 seconds. The average cost of a data breach is $3.9 million. The role of Chief Information Security Officer (CISO) is gaining popularity to protect against information security risks. Let’s take a look at the emerging CISO role.

article thumbnail

Rehearsing Plan B: The Importance of Mastering Your Workarounds

MHA Consulting

In terms of bang for the buck, not all business continuity activities are created equal. One of the most valuable ways BC practitioners can spend their time is making sure their organizations can truly execute on their manual workarounds. Related on MHA Consulting: The Retro Revolution: Why Manual Workarounds Are a BC Must Rehearsing Your Plan B Due to the complexity of BC methodology, many aspects of the field have the potential to become time sinks.

article thumbnail

Russia's Imperial Ambitions Are a Clear Threat to NATO

The Rand Blog

As long as Moscow uses force to pursue imperial ambition, Russia's neighbors and NATO members will be under threat. Multiple factors could affect this, including the outcome of the war in Ukraine, Russia's capacity to rebuild military power while repressing domestic opposition, and Western resolve.

Capacity 110
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

HCI: The Pivotal Element of Tomorrow’s IT Strategies

Solutions Review

StorMagic’s Bruce Kornfeld offers insights on HCI and how it is set to be a pivotal element of tomorrow’s IT strategies. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. In sometimes not-so-quiet leadership meetings, amid discussions of future forecasts and budgets, today’s IT leadership faces a puzzling issue.

article thumbnail

SIA Leads Letter to Congress Urging Protection of Security Devices Under Spectrum Proposal

Security Industry Association

On Oct. 29, 2024, the Security Industry Association (SIA) sent a letter signed by 92 security businesses and organizations conveying a strong, industrywide message to Capitol Hill urging members of Congress to weigh in with the Federal Communications Commission (FCC) on a proposal that would restructure the Lower 900 MHz frequency. As explained in a recent SIA post on the issue, the proposed licensing and rulemaking would affect alarm, electronic access and security camera technologies, among ot

Security 105
article thumbnail

KaseyaOne Centralized User Management Now Available for UniView

Unitrends

In today’s fast-paced business environment, organizations thrive on efficiency and streamlined operations. A centralized platform that integrates all essential IT tools not only saves time but also boosts productivity and security. Imagine accessing all your critical applications with just one login, seamlessly switching between them without the hassle of multiple passwords.

article thumbnail

Regulatory Revenue? 10 Ways to Turn Compliance into a Competitive Advantage 

Pure Storage

Regulatory Revenue? 10 Ways to Turn Compliance into a Competitive Advantage by Pure Storage Blog Summary Not complying with regulations like DORA, GDPR, and HIPAA isn’t an option, but compliance doesn’t have to be an obstacle either. By making compliance a top priority and your business’s best friend, you can turn it into a competitive advantage. The European Union’s Digital Operational Resilience Act (DORA) goes into effect this coming January.

article thumbnail

Integrating Cybersecurity into Business Continuity Planning: A Comprehensive Guide

BryghtPath

Cybersecurity and business continuity planning (BCP) are inseparable in today’s interconnected world. As businesses become increasingly reliant on digital infrastructure, the risk of cyberattacks grows exponentially. Cyber threats can disrupt operations, compromise sensitive data, and damage an organization’s reputation. Consequently, when creating a business continuity plan, organizations must consider cybersecurity to ensure operational resilience and … The post Integrating Cyberse