You've requested...

Share this with your colleagues:

The Myths and Realities of Cloud-Based Data Protection

If a new window did not open, click here to view this asset.

Download this next:

The true cost of ownership – Microsoft SCCM patch management

When it comes to shopping for new software solutions, most organizations grossly underestimate the actual cost of their purchase. The sticker price is often the cost of acquiring the license – maintenance costs should also be taken into consideration.

In this article, dissect Microsoft’s on-prem SCCM patch management solution to uncover the three key areas where hidden costs lie:

  • Hardware costs
  • Software costs
  • Operational costs

These are also closely related to: "The Myths and Realities of Cloud-Based Data Protection"

  • Prevention Is Your First Line of Defense from Ransomware. But What If Prevention Fails?

    Prevention is your first line of defense from ransomware, but what if prevention fails?

    Take this brief survey to download your free guide and learn how to prevent cyberattacks. It is not a matter of if you and your company will get hit, but a matter of when.

    Learn about how StorageCraft's cloud services OneXafe and ShadowXafe are purpose-built disaster recovery cloud platforms designed for total business continuity.

  • How to tackle trust management


    Trust, or the placing of it, is one of the key activities at the core of our human endeavours. The process of placing trust is simpler when the process is physical and proximal - that is when you can see, feel and touch that which you are about to trust.  We have as human beings developed a number of risk management skills that we often cannot explain in concrete or scientific terms;  “They looked shifty”, or “The bridge looked rickity”.  These skills help us to decide whether or not to place trust.   The emergence of electronic networks that distance us from that which we want to trust introduce a number of new difficulties.   Simply put, we have not developed the appropriate mechanisms to place trust virtually, the requirements for which are clearly stated in the two Jericho Forum Commandments JF#6 and JF#7 which come under the heading: The need for trust.

Find more content like what you just read:

  • The CIO’s cybersecurity checklist

    CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.

    Download

  • Essential Guide to Threat Management

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

    Download

  • Web security: Overlooked risks

    It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.

    Download

  • How to Thwart Privilege Creep with Access Reviews

    In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.

    Download

  • Three Increasing Threats to Operational Resiliency And How to Defeat Them

    In today's data-driven world, data loss and downtime can be disastrous.

    Download

  • Risk & compliance in COVID-19

    COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.

    Download

  • How to tackle risk lifecycle management

    The Jericho Forum’s Collaboration Oriented Architectures (COA) enable enterprises that build COAcompliant architectures to operate in a secure and reliable manner.

    Download

  • Accelerating your path to security maturity

    The Secureworks Security Maturity Model is designed to help organizations evaluate and understand their current security maturity in order to develop strategies and target areas for improvement. Want to learn more? View this webcast today.

    Download

  • Achieving ISO 27001 and 27002 Certification with ZenGRC

    The Challenge: Meeting evolving InfoSec mandates, when starting nearly from scratch.

    Download

  • Research report: Top Iranian threat groups & notable campaigns

    In a recent study, cybersecurity experts studied leading cyberthreat groups across Iran in order to provide a comprehensive report summarizing documented campaigns, common target & actor types, and geographic trends in attack patterns – all in order to help organizations be better prepared in the event of an attack.

    Download

  • Targeted attacks: Preparation and Mitigation

    This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.

    Download

  • Collaboration: The key to effective vulnerability management

    As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.

    Download

  • Vulnerability management: Don’t rely solely on CVSS – here’s why

    While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.

    Download

  • Ask yourself: Is my vulnerability management process effective?

    When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.

    Download

  • 3 easy steps towards vulnerability remediation

    As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.

    Download

  • Vulnerability management: Which metrics matter & which don’t?

    Metrics enable organizations to share information about cybersecurity risks and demonstrate vulnerabilities – but only if they’re the right metrics. So, how can you delineate between metrics of significance and those that can be ignored? Read on to find out.

    Download

  • A CARTA- Based, Zero Trust Approach to Workload Security

    In this webcast, learn how adopting a Continuous Adaptive Risk and Trust Assessment, or CARTA approach, provides a zero-trust foundation for security and risk management leaders to gain more insight for contextual-based decision-making.

    Download

  • Vulnerability management: Navigating to new heights

    Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.

    Download

  • Cloud security: Managing third-party risk

    According to Nemertes Research, this is the year most workloads will be in the cloud versus in on-premises data centers. While the benefits of cloud services can’t be overlooked, these changes also present a security risk. In this e-guide, uncover the 3 changes IT professionals should consider in order to manage third-party risk.

    Download

  • Master vulnerability remediation in 8 steps

    In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.

    Download

  • The risk and business impact of new exploits targeting SAP business apps

    In April 2019, several new exploits targeting SAP business applications were released in a public forum. Download Onapsis threat report to determine if you are at risk and steps to take for remediation.

    Download

  • Managing Cloud Computing Risk

    Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

    Download

  • Top 5 vulnerability management mistakes to avoid

    Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.

    Download

  • Risk Management Information Systems: The Buyer's Guide

    This e-book will help you decide if a RMIS is right for you – whether you are considering purchasing a RMIS for the first time, replacing a homegrown system, or upgrading an outdated one.

    Download

  • Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks

    This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!

    Download

  • Information Security Threats: Building Risk Resilience

    Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.

    Download

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.

    Download

  • Patch management: On-prem vs Cloud-based

    Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.

    Download

  • Life After Lockdown: A Playbook for Crisis Recovery, Resiliency and Restarting Right

    This e-book presents a simple, organized way to recover stronger, build resilience, and restart right to withstand whatever comes next.

    Download

  • Rethinking third-party risk management

    Traditional best practices for third-party risk management are leaving organizations vulnerable. In this e-guide, learn how to improve accuracy of security questionnaires, interview third-party employees about risk and rethink third-party risk management best practices in this changing threat landscape.

    Download

  • How to tackle trust management and business impact levels

    Back in the time when businesses were predominantly “local” and to a large extent insulated from each others operations, it really didn’t matter very much how we defined the Business Impact of Information Risks, for we knew what we meant in each business and we didn’t have much need to share that meaning with others.

    Download

  • The Pros and Cons of Delivering Web Pages Over an SSL Connection

    Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.

    Download

  • Reduce your attack surface by making sense of the risks you face

    According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.

    Download

  • Charting a Course For Enterprise Risk Management

    This e-book will explain what ERM is, why it's worthwhile, and how to begin managing risks and opportunities holistically.

    Download

  • The Chief Risk Officer and the dreadful, horrid, inefficient, very bad day

    Learn how you can handle operational, market, compliance and reputation concerns, and why it is important to get a good handle on your company's electronic communications data.

    Download

  • Denver simplifies and accelerates vendor risk management with ServiceNow

    For the city and county of Denver, information security is critical. The organization deals with many different types of sensitive information, including the personal data of its citizens. This case study reveals how ServiceNow was able to simplify its vendor experience with a risk survey portal, automated backend processes, and much more.

    Download

  • Tips for cybersecurity leaders on meeting with the board of directors:

    Read about the common challenges that IT, security, risk, and audit leaders often face when meeting with their board of directors and how to overcome them.

    Download

  • E-Guide: How to tie SIM to identity management for security effectiveness

    Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.

    Download

  • Threat visibility: The key to finding & understanding risks

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

    Download

  • The benefits of comprehensive archiving for social media & text

    The popularity of text messaging and social media has exploded in recent years, including in the workplace. In this white paper, examine how public safety agencies can create policies that allow for compliant use of text messaging and social media, and how to retain those communications for an efficient response to open records requests.

    Download

  • Augmenting threat intelligence: Airbus Cybersecurity case study

    How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.

    Download

  • Ransomware Resiliency: The Risks Associated with an Attack and the Reward of Recovery Planning

    An overview of the history of ransomware, its potential impact and best practices to protect IT systems.

    Download

  • How to assess your IT security risks in healthcare environments

    In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.

    Download

  • Five Ways To Defend Data From Ransomware

    By 2021, it's estimated a new organization will fall victim to ransomware every 11 seconds, costing businesses apredicted $20 billion globally.

    Download

  • Test guide: Preparing for the Security+ SY0-501 exam

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

    Download

  • How firms can improve their supervision workflows to better reveal risk

    How can firms improve their supervision workflows to better reveal risk? In this guide, examine some strategies for staying on top of the rapidly evolving communications landscape, and the new vectors for risk it offers.

    Download

  • Key points to consider when crafting your text message policy

    Sending text messages between mobile devices is now public business, and by law, the records need to be preserved. This white paper contains steps that will help public sector organizations develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication.

    Download