Search
Close this search box.
Latest & Greatest Post

Disaster Recovery as a Service (DRaaS): What It Is & How It Works

Read More
Avatar photo
webops
Most Recent
Search

Explained: FTC Safeguards Rule Compliance Deadline Delayed

Many companies are facing personnel shortages and supply chain issues that make the December 2022 FTC Safeguard Rule compliance deadline difficult. In response to the current situation and industry lobbying, the FTC extended the compliance deadline to
Avatar photo
Steven Brown
>>Read More

Podcast: The Basics of Cyber Resilience

 Episode Summary Cyber resilience is an evolution in mindset for the world of information security. It has been happening for years. Relying on firewalls, anti-virus, and other preventive manners at the expense of planning for what if can mean that a
Avatar photo
Bill Bowman
>>Read More

Cyber Resilience vs. Cybersecurity: Key Differences

Cyber resilience and cybersecurity get bunched together in discussions around digital protection, but they are two separate philosophies. Both are important to understand and implement in your organization. There are overlaps in the implementation of b
Jesse Sumrak
>>Read More

Airiam Hires Alan Villaseñor to Build and Manage SOC

Airiam, a managed IT and cybersecurity company with a deep focus and expertise on ransomware recovery, cyber resilience, and immutable backups today announced Alan Villaseñor will lead the company’s security operation center (SOC). Villaseñor holds CIS
Avatar photo
Bill Bowman
>>Read More

Podcast: A Story of Resilience from Airiam’s Alex Zelenskiy

 Episode Summary Since Russia attacked Ukraine in February 2022, the war has upended the lives of millions and resulted in the tragic loss of many lives. Amidst the chaos and destruction, there are stories of resilience and goodness. Airiam’s Alex Zel
Avatar photo
Bill Bowman
>>Read More

Cyber Resilience Framework: How to Develop a Resilience Strategy

Your cyber resilience framework defines the techniques and processes your business uses to protect its sensitive data, services, and uptime. Frameworks will vary depending on your geographic operations, industry, and datasets, but many of the fundament
Jesse Sumrak
>>Read More

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.