Thu.Aug 05, 2021

article thumbnail

Employee Cybersecurity Risks: The Call is Coming From Inside the House!

DRI Drive

As more employees return to the office from telework environments, it’s time for them to tighten up their cybersecurity habits, if the responses from a recent survey are any indication. A poll of 8,000 workers worldwide on cybersecurity practices found that 79% had engaged in at least one risky activity in the past year. Among […]. The post Employee Cybersecurity Risks: The Call is Coming From Inside the House!

article thumbnail

What’s next for floating agriculture? 

Crisis Response Journal

Haseeb Md Irfanullah looks at the origins of growing crops on floating plant rafts in Bangladesh and how the practice has evolved over time, asking what the next phase in the development of such agriculture will be

100
100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attending #BHUSA 2021: The cybersecurity experts’ view

Acronis

As Diamond sponsors for the Black Hat 2021 conference, Acronis sent Acronis’ VP of Cyber Protection Research Candid Wuest and Cybersecurity Analyst Topher Tebow to attend sessions, answer questions, and gather as many insights as possible.

article thumbnail

What we have learned about remote work … so far

Citrix

Before the COVID-19 pandemic, if I had asked a CTO if they thought they could transition up to 70 percent of their organization’s workforce to remote work in a short period of time, they would have dismissed me, if not … The post What we have learned about remote work … so far first appeared on Citrix Blogs.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Create enterprise-ready container environments with Veritas InfoScale

VOX Veritas

InfoScale 7.4.3, available today, is the ideal solution for running your enterprise applications in containers, with the storage and monitoring they need to be highly available.

More Trending

article thumbnail

Five Core Elements Of An Effective Cyber Response Capability

Castellan

Article Originally Published on Forbes in August 2021. When Colonial Pipeline was forced to shut down its 5,500 miles of pipeline after being hit by a cyberattack in May, it impacted more than just your daily commute. What followed was a temporary gas shortage caused by panicked Americans and a major disruption not only for Colonial Pipeline but also for organizations that rely on the top pipeline operator’s fuel supplies — all because of a ransomware attack. “The shutdown of such a

article thumbnail

Human-Led and Technology-Powered: Accelerating Your North Star of Resilience

Fusion Risk Management

Solutions Customer Summit Series. I had the pleasure of moderating our customer panel at Solutions21 this summer, which included Delroy A. Ross, Ashley Goosman, Renuka Darbha, and Joseph Woulfe. Each shared insights on how leading global firms are building human-led and technology-powered resiliency that drives agility in disruption and accelerates business transformation.

article thumbnail

What is Data Mesh?

Advancing Analytics

To be able to properly describe what Data Mesh is, we need to contextualise in which analytical generation we currently are, mostly so that we can describe what it is not. Analytical Generations The first generation of analytics is the humble Data Warehouse and has existed since the 1990s and, while being mature and well known, is not always implemented correctly and, even the purest of implementation, comes under the strain of creaking and complex ETLs as it has struggled to scale with the incr

article thumbnail

How Critical Event Management Technology Builds Resiliency

On Solve

Former Federal CIO Suzette Kent recognizes the multiple challenges organizations have faced in the last year – and believes we have an extraordinary opportunity to build resiliency and improve people’s lives and well-being. This ebook shares highlights of her April 2021 keynote speech at the OnSolve Nexus conference. In this ebook, you’ll learn her perspective on the elements of success, including: Responsible, intentional use of technology The dynamics of human-technology interactions Trust in

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Data Mesh Deep Dive

Advancing Analytics

In a previous post , we laid down the foundational principles of a Data Mesh, and touched on some of the problems we have with the current analytical architectures. In this post, I will go deeper into the underlying principles of Data Mesh, particularly why we need an architecture paradigm like Data Mesh. Let’s start with why we need a paradigm like Data Mesh.

article thumbnail

How technology can be used to transform the employee experience

Citrix

I think we can agree, with some degree of certainty, that remote work is here to stay. While many organizations entered the pandemic entirely unprepared for widespread home working, one year on, it is highly unlikely that post-pandemic, we will … The post How technology can be used to transform the employee experience first appeared on Citrix Blogs.

article thumbnail

4 Steps to Business Continuity Planning Success

BryghtPath

Google search “business continuity planning steps” and you’ll find a yard sale of results. Is it 5 steps, or 7, or 4? Which are the most involved and which are the most important? How long does the business continuity planning process take? And who should be involved? I would love to be the definitive source … The post 4 Steps to Business Continuity Planning Success appeared first on Bryghtpath.

article thumbnail

Preparing Your Employees and Business for a Wildfire Evacuation

Alert Media

The post Preparing Your Employees and Business for a Wildfire Evacuation appeared first on AlertMedia.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Reduce Ransomware Risk with SafeMode Advisory Workshop

Pure Storage

Many organizations focus on ransomware prevention. But as attacks grow increasingly sophisticated and widespread, they’re also becoming more inevitable. And there’s no guarantee that bad actors can’t thwart even the strongest prevention security in the ransomware arms race. Pure Storage ® takes a different approach by focusing on ransomware mitigation and rapid recovery.