Tag Archive for: Cybersecurity

Automate and Orchestrate for Better Business Continuity

By Rohit Thakur

In the age of digital transformation, automating and orchestrating your disaster recovery workflow is essential for business continuity. Read More

By Rohit Thakur
Head of Marketing, IBM Resiliency Orchestration and Global Portfolio Marketing Manager

May 11, 2018

Business Continuity Team: Are You Ready for the Next Cyberattack?

By Mijee Briana Walker

Cyber resiliency is a team sport. It's in companies' best interests to have the business continuity, security and disaster recovery teams work together. Read More

By Mijee Briana Walker
Asia Pacific Leader for IBM Resiliency Services

May 10, 2018

Cyber Resiliency Is the Key to Business Continuity

By Rohit Thakur

Cyberattacks are a continual threat to business continuity. Tackle the challenge with a cyber resiliency approach. Read More

By Rohit Thakur
Head of Marketing, IBM Resiliency Orchestration and Global Portfolio Marketing Manager

May 9, 2018

How to Strengthen Resiliency to Manage Cyberattacks in an Always-On World

By Benedikt Ernst

Following the IBM Cyber Resiliency Lifecycle helps organizations address a combined security and resiliency system to successfully cope with cyberattacks in… Read More

By Benedikt Ernst
Senior IT Management Consultant in IBM Resiliency Consulting Services, IBM

March 27, 2018

The Cyber Resilient Organization, Part III: Cyber Resiliency Defense in a Hybrid IT World

By Kaustubh Vazalwar

Today's hybrid IT environments need appropriate focus and the right tools in order to maintain cyber resiliency. Read More

By Kaustubh Vazalwar
Group Manager : Global Resiliency, IBM

March 19, 2018

The Cyber Resilient Organization, Part II: Cyber Resilience vs. Cybersecurity

By Kaustubh Vazalwar

What is the difference between a cyber resilient organization and a secure one? It all comes down to the principles behind the two concepts. Read More

By Kaustubh Vazalwar
Group Manager : Global Resiliency, IBM

March 15, 2018

Break It Down: 3 Ways Continuous Compliance Simplifies Patch Management

By Virginia Mayo

Risk-based continuous patching automates the time-consuming and repetitive tasks of patch management for improved security. Read More

By Virginia Mayo
Senior Technical Staff Member (STSM), IBM Senior Certified/L3 IT Specialist GTS

March 7, 2018

Three Questions to Ask Your Cloud Provider About Security for Your SAP Environment

By Madhuri Chawla

If you're considering the benefits of deploying critical information in the cloud, here are three questions to ask a potential cloud provider about protecting… Read More

By Madhuri Chawla
Director of Enterprise Applications Solutions, IBM Cloud Services

March 6, 2018

Don’t Get Tricked Into Compromising Your Data

By Daniel Newman

Cybercriminals are targeting companies by tricking employees. Here are three common tricks being used and ways you can avoid them. Read More

By Daniel Newman
Founder and President, Broadsuite, Inc.

February 26, 2018

Don’t Do It Alone: Turn to Managed Security Services

By Daniel Newman

Many organizations are adopting a hybrid approach to managed security services as they deal with tight budgets and security threats. Read More

By Daniel Newman
Founder and President, Broadsuite, Inc.

February 21, 2018