Operations | Monitoring | ITSM | DevOps | Cloud

Global Industrial Leader Coordinates Severity 1 Incidents with Clarity and Speed

“The first 15 minutes of a Sev-1 incident often determine the next 15 hours.” For a multi-billion dollar global industrial leader, managing Severity 1 incidents across a complex, distributed infrastructure is a high-stakes operation. When systems go down, the impact is felt instantly across production lines and global logistics.

From plan to practice to prevail: my conversation with Chris Johnson, host of the MSSP 1337 podcast

In cybersecurity, prevention often gets most of the attention. But no matter how strong your defenses are, incidents will happen. And how you respond in that moment of truth defines resilience. That’s why I really connected with a framework Chris Johnson shared with me on the MSSP 1337 podcast, the 3 P’s – plan, practice, prevail.

The 6th DORA requirement no one told you about

In this day and age, rare is the organization (if there is one at all) that has never been hit by a cyberattack. Few have escaped the nightmare of systems going down, customers losing access to their accounts, or payments getting stuck mid-transfer. Just as common is all the stress on the path to recovery and the absence of a structured, streamlined, and repeatable process for effectively preparing for the worst.

Gett replaces paging tool with Exigence to achieve IR excellence

“By the time a pager alerts you to a problem, it’s too late to think about how to manage the incident.”(Google SRE Workbook) Gett, a global leader in urban mobility and corporate travel tech, knew that relying on its incumbent paging system and siloed manual processes for incident management was no longer sustainable. Any delay in response and service restoration could jeopardize customer satisfaction and business continuity.

How MSPs and MSSPs can reduce risk and liability for their clients

For 83% of companies, a cyber incident is just a matter of time (IBM). And when it does happen, it will cost the organization millions, coming in at a global average of $4.35 million per breach. Add to that stringent data protection laws and the growing frequency and reach of ransomware and other sophisticated attacks.

Automate insights-rich incident summaries with generative AI

Does this sound familiar? The incident has just been resolved and management is putting on a lot of pressure. They want to understand what happened and why. Now. They want to make sure customers and internal stakeholders get updated about what happened and how it was resolved. ASAP. But putting together all the needed information about the why, how, when, and who, can take weeks. Still, people are calling and writing. Nonstop.

How generative AI is increasing cyber risk & what to do to make sure you're ready

Generative AI is all the buzz these days with the popularity of platforms and tools such as ChatGPT, Bard, Scribe, Jasper, and others experiencing exponential growth. This is a technology that has come to the fore with the force of a runaway train that’s bringing us head long into the future at the speed of light. It is transforming everything we do from writing code to making travel plans. And cybersecurity is no exception.

How summertime turns up the heat on cyber readiness (and what to do about it)

“Malicious cyber actors aren’t making the same holiday plans as you.” (CISA & FBI) Summertime is prime time for cyberattacks. According to one survey, 58% of security professionals believe that there is seasonality in the attacks that their company experiences every year, with the majority citing summer as high season for breaches.