2024

article thumbnail

Ticketmaster Breach May Have Exposed Millions of Users’ Data

DRI Drive

In a year where the company is already under fire from the U.S. Department of Justice and summer concert goers balking at high prices, news of a massive data breach is yet another black eye for Ticketmaster. Live Nation Entertainment, Ticketmaster’s parent company, disclosed a breach of its database to the Securities and Exchange Commission, […] The post Ticketmaster Breach May Have Exposed Millions of Users’ Data appeared first on DRI Drive.

article thumbnail

Federal Government Will Require Purchase of ‘Made in America’ Drones

Disaster Zone

A long time coming.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nearly two decades after Hurricane Katrina swept through the Gulf Coast, what policies have changed?

National Center for Disaster Prepardness

A look at some key legislation since Hurricane Katrina. By Zayna Syed Streets that looked like canals, the Superdome surrounded by water, scores of displaced people on highway overpasses —these are some of the historic images that emerged from the floodwaters of Hurricane Katrina. As we approach the hurricane’s 19th anniversary, it is worth looking at how much Katrina has influenced emergency management and the legislation crafted in its wake.

article thumbnail

Navigating Data Resilience with Zerto: Insights from the Global CrowdStrike Outage

Zerto

In an era where data is the lifeblood of organizations, ensuring its resilience against unexpected outages is paramount. The recent CrowdStrike outage that impacted millions of Microsoft Windows devices worldwide has highlighted vulnerabilities within many companies’ disaster recovery frameworks. This brings the essential role of robust disaster recovery and business continuity solutions like Zerto to the fore.

Outage 126
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Pure Introduces First External Block Storage for Azure VMware Solution

Pure Storage

Pure Introduces First External Block Storage for Azure VMware Solution by Pure Storage Blog Today, we are excited to announce that the Pure Storage Platform now delivers the first generally available external block storage for Microsoft’s Azure VMware Solution to improve TCO for VMware workloads in Azure. For customers with storage-intensive VMware workloads, Pure Cloud Block Store ™ provides the flexibility to match your Azure VMware Solution compute needs with your storage capacity needs—optim

More Trending

article thumbnail

Security Industry Association Announces Program for 2024 Securing New Ground Conference

Security Industry Association

Top C-suite, cybersecurity and business leaders – including keynote speaker Nasdaq’s Phil Mackintosh– will headline the security industry’s executive conference taking place Oct. 8-9 in New York City. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced the schedule, speaker lineup and program for the 2024 Securing New Ground (SNG), the security industry’s executive conference, taking place Oct. 8-9 at the Westin New York Grand Central in New York City.

Security 105
article thumbnail

Learning from Major Incidents: The Opportunities We’re Missing by Nora Jones

PagerDuty

While they are untimely, stressful and likely to highlight communication breakdowns within an organization; incidents can be a powerful tool for learning and growth in organizations. When an incident occurs with a large impact, which it feels like we read about this happening in the news on a weekly basis, oftentimes the focus is on two things: stabilizing the situation, and controlling the narrative.

Outage 113
article thumbnail

Ukraine Has Found a Path to Victory

The Rand Blog

Ukraine has pulled off an operation that could buy time to regenerate and reequip its forces. The Kursk incursion puts in doubt Russia's ability to launch any major offensives for the rest of the year. Given sufficient Western aid, Kyiv could have the capability to begin restoring its territory in 2025.

111
111
article thumbnail

How you can afford Business Continuity Planning.

KingsBridge BCP

Business Continuity Planning (BCP) on a budget You know you should, customers are demanding and if you want to grow the auditors will require, but how can you afford business continuity planning with the $0 budget you’ve got? Sound familiar? Lucky for you, KingsBridgeBCP has been writing Business Continuity Plans since 1983, so we’ve seen […] The post How you can afford Business Continuity Planning. appeared first on KingsBridgeBCP.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

KaseyaOne Centralized User Management Now Available for UniView

Unitrends

In today’s fast-paced business environment, organizations thrive on efficiency and streamlined operations. A centralized platform that integrates all essential IT tools not only saves time but also boosts productivity and security. Imagine accessing all your critical applications with just one login, seamlessly switching between them without the hassle of multiple passwords.

article thumbnail

Cybersecurity Guidance for High-Risk Nonprofits on the Heels of the Latest Healthcare Breach

DRI Drive

With healthcare providers like Ascension hindered by cyberattacks, the Cybersecurity and Infrastructure Security Agency (CISA) offers guidance for these at-risk organizations. In early May, Ascension, a major U.S. healthcare network, was hit by a ransomware attack that impacted hospitals across 19 states. This forced the organization to revert to “downtime procedures” – meaning paper records […] The post Cybersecurity Guidance for High-Risk Nonprofits on the Heels of the Latest Healthcare

article thumbnail

Leading vs Lagging Indicators: What’s The Difference?

BMC

Leading and lagging indicators are terms for statistics you use to measure and manage performance. Both can help you gain an understanding of business conditions and trends. Below is a simple explanation of leading indicators and lagging indicators, the difference between them, and how to use each. What are indicators? Indicators are statistics used to measure what may be affecting your business.

article thumbnail

Rehearsing Plan B: The Importance of Mastering Your Workarounds

MHA Consulting

In terms of bang for the buck, not all business continuity activities are created equal. One of the most valuable ways BC practitioners can spend their time is making sure their organizations can truly execute on their manual workarounds. Related on MHA Consulting: The Retro Revolution: Why Manual Workarounds Are a BC Must Rehearsing Your Plan B Due to the complexity of BC methodology, many aspects of the field have the potential to become time sinks.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Keep a Keen Eye on your SaaS Backups!

Zerto

Zerto Backup for SaaS, powered by Keepit, introduces a monitoring dashboard for your SaaS backups. Why Monitoring and Analyzing your SaaS Backup Data is important? Despite basic out-of-the-box protection from SaaS vendors, data residing in SaaS applications is your responsibility, not the vendor’s. This data is exposed to potential risks like outages, accidental deletion, and ransomware attacks that can lead to loss or downtime.

Backup 116
article thumbnail

New Enhancements to VMware Integration for High Availability and Data Protection

Pure Storage

New Enhancements to VMware Integration for High Availability and Data Protection by Pure Storage Blog Today, we are happy to announce new capabilities in collaboration with VMware (acquired by Broadcom) that provide high availability and robust data protection—natively integrated into VMware vSphere. IT infrastructure teams need the highest levels of availability to support mission-critical workloads.

article thumbnail

Acronis True Image: A familiar name returns!

Acronis

Welcome back to Acronis True Image, a leader in digital protection for over 20 years, trusted by over 5.5 million users globally. With a history of preventing more than one million cyberattacks, Acronis True Image stands as a legacy of reliable and secure personal data protection.

Security 116
article thumbnail

Security Industry Association Announces Winners of the 2024 SIA New Products & Solutions Awards

Security Industry Association

IronYun took the top honor in SIA’s annual award program recognizing innovative security products in partnership with ISC West. LAS VEGAS, Nev. – The Security Industry Association (SIA) has announced the 2024 winners of the SIA New Products and Solutions (NPS) Awards , the flagship awards program presented in partnership with ISC West recognizing innovative security products, services and solutions.

Security 119
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

How to Connect the Dots Between Risks and Goals for Board Insight

LogisManager

How to Connect the Dots Between Risks and Goals for Board Insight Last Updated: June 4, 2024 Effective corporate governance hinges on the ability to provide the Board of Directors with clear, actionable insights into your organization’s risks and how they impact strategic goals. As a trusted advisor, you face the challenge of assembling information across functions and levels while maintaining a comprehensible picture of risk.

article thumbnail

A Plan to Address Political Violence Before Election Day

The Rand Blog

As the presidential election nears, the threat of political violence looms large. What can be done to protect candidates, election workers, voters, and the electoral process at the heart of American democracy?

110
110
article thumbnail

Enhancing inclusive emergency communication: Addressing access and functional needs communities amid disasters

everbridge

By Brian Toolan , Vice President, Public Safety, Everbridge In times of crisis, effective communication is critical to ensuring the safety and well-being of all individuals in our communities. However, traditional communication methods may not adequately reach or cater to the needs of those with access and functional challenges. It’s imperative that emergency communication strategies are inclusive and considerate of the diverse needs of every member of society.

article thumbnail

What Is the Difference Between RTO and RPO?

Unitrends

In today’s fast-paced digital environment, understanding the intricacies of data recovery is crucial for businesses aiming to minimize downtime and data loss. Two pivotal concepts in this realm are the recovery time objective (RTO) and recovery point objective (RPO). While they may sound similar, their roles in disaster recovery (DR) and business continuity planning (BCP) […] The post What Is the Difference Between RTO and RPO?

BCP 105
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

Cyber Risk & Your Supply Chain: Managing the Growing Threat

NexusTek

READ TIME: 4 MIN January 17, 2024 Cyber Risk & Your Supply Chain: Managing the Growing Threat You’ve likely heard that employees are the top source of cyber risk for businesses. But when you imagine “employee error” resulting in a data breach at your company, does it occur to you that this might be one of your suppliers’ employees? It could be.

article thumbnail

Sustainable Transformation: A New Imperative for IT Leaders

BMC

In today’s rapidly evolving business landscape, the intersection of environmental sustainability and technology is more critical than ever. A recent survey by Gartner ® highlights this shift: “64 percent of CEOs said they view environmental sustainability as a growth opportunity.” 1 I believe this perspective is further bolstered by the inclusion of sustainable technology in the Gartner Top 10 Strategic Technology Trends for 2024 2 report, which, in my opinion, signals a clear readiness am

article thumbnail

At Risk of Distraction: The Seductive Appeal of RMIS Software

MHA Consulting

An emerging hot topic in business continuity and risk management is the software known as a risk management information system (RMIS). An RMIS can help an organization identify, assess, monitor, and mitigate risks, but often they merely seduce and distract companies that are not in a position to make proper use of them. Related on MHA Consulting: BCM Software Buyer’s Guide: Five Things to Know Before You Buy Introducing RMIS Recently, we’ve been getting many questions from our consulting clients

BCM 106
article thumbnail

Modern Data Protection: What Is It and Why Should You Care?

Zerto

Data is at the center of business. For many organizations, digital adoption drives strategy. Data is essential to meeting customer needs, responding to sudden market shifts and unforeseen events. That’s why data protection should be on your mind. What Is Data Protection? Data protection is the process of safeguarding important information from corruption, compromise, or loss.

Backup 114
article thumbnail

Randomware Shakes Up the Ransomware Game

Pure Storage

Randomware Shakes Up the Ransomware Game by Pure Storage Blog In the ever-evolving landscape of cyber threats, just when you thought you’d seen it all, along comes Randomware —the ransomware with a sense of humor! Forget the ominous warnings and dark screens. Randomware takes a lighthearted approach to extortion. It’s not about draining your bank account or stealing your secrets; it’s about making you laugh while you pay up.