article thumbnail

The Problem of Surge Capacity

The Rand Blog

The vulnerability of supply chains to routine disruptions has been widely discussed and documented, but meeting such challenges can be even more difficult during unexpected surges in demand caused by wars, public health crises, or other emergencies. The creation of option contracts that would kick in during surges is one promising solution.

article thumbnail

Community Disaster Resilience Zones

Recovery Diva

From ESRI: Creating Local Capacity in Community Disaster Resilience Zones “On September 1, 2023, the Federal Emergency Management Agency (FEMA) announced the first round of Community Disaster Resilience Zones (CDRZ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Book Review: The Invention of Disaster

Recovery Diva

Book Review: The Invention of Disaster: Power of Knowledge in Discourses of Hazard and Vulnerability. The author posits that the attempt to reduce disaster losses by bridging the “nature/hazard versus culture/vulnerability binary” by the Western governments in the lesser developed parts of the world has only been partially effective.

article thumbnail

Why Every BC Professional Should Become a Gap Hunter

MHA Consulting

Related on MHA Consulting: How to Get Strong: Unlocking the Power of Vulnerability Management The Practice of Vulnerability Management Last week, MHA CEO Michael Herrera wrote a blog about vulnerability management , the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology.

article thumbnail

How NetScaler CPX License Aggregator simplifies CPX licensing in Kubernetes

Citrix

The features NetScaler supports as well as its throughput capacity are usually unlocked by a license. Related Stories Open Policy Agent support for Kubernetes using Citrix Ingress Controller Worried about the latest OpenSSL vulnerability? NetScaler can help.

Banking 70
article thumbnail

Community Emergency Managers: Maximize Impact with B.C.’s New Indigenous Engagement Funding

CCEM Strategies

For example: Risk assessments and emergency and business continuity plans now need to consider Indigenous knowledge, climate change, cultural safety, and impacts on vulnerable persons, animals, places or things. Use the results to set engagement, consultation, and collaboration objectives and form the basis for long-term capacity development.

article thumbnail

Key Steps a CIO Should Take after a Ransomware Attack

Solutions Review

Eliminating or resolving the threat is tempting but it often prevents the opportunity to analyze the threat actor’s actions, which can reveal a lot about their intent, target, and strategy, as well as the company’s own vulnerabilities. Scanning security measures will help identify any immediate gaps or vulnerabilities in your attack surface.