Security & Business Resilience
Image courtesy of: gorodenkoff (iStock / Getty Images Plus)
Explore strategies and solutions for security business resilience to ensure organizational continuity, risk mitigation, and recovery from disruptions.
- How CSOs Can Win Board Support for Gunshot Detection Technologyon April 17, 2026 at 4:00 am
How CSOs can win board support for gunshot detection technology.
- What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignoreon April 16, 2026 at 2:00 pm
The Pitt may end its story with systems restored, but real hospitals don’t get that clean ending.Â
- Ransomware Response: How Businesses Regain Control Under Pressureon April 8, 2026 at 9:00 am
You can’t control when ransomware attacks happen, but you can control how you respond.
- Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asseton April 3, 2026 at 9:00 am
Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.
- Taming the Threat Beast: Building a Threat-Led Cybersecurity Programon March 20, 2026 at 1:00 pm
Moving from noisy threat feeds to focused intelligence that security teams can actually act on.
- Iran Conflict and Cybersecurity: What to Expect in the Next 30 Daysby algerj@bnpmedia.com (Jordyn Alger) on March 4, 2026 at 5:00 pm
What to expect as the conflict between the United States and Iran unfolds.Â
- Why Security Teams Can No Longer Ignore Recruitment Fraudon March 2, 2026 at 10:00 am
Recruitment sits at the intersection of brand, identity, and external engagement, yet it has historically lived outside formal security ownership.Â
- Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economyon February 13, 2026 at 7:00 pm
The six-phase playbook of how romance scams actually work.Â
- How to Protect Organizations During the Winter Olympics, According to CISOsby algerj@bnpmedia.com (Jordyn Alger) on February 5, 2026 at 4:00 pm
CISOs analyze Winter Olympic threats such as phishing, fraud and more.Â
- Leveraging ISACA for Your CMMC Careeron February 3, 2026 at 5:00 am
The Cybersecurity Maturity Model Certification sets the benchmark for how DoW contractors prove cybersecurity readiness.
- Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surgingon February 2, 2026 at 8:00 am
With pure exfiltration, businesses don’t realize they’re a victim until it’s too late.Â
- Securing Trust: Why Crisis Communication is Your First Line of Defenseon January 30, 2026 at 5:00 am
Trust is lost in minutes during a crisis, and clear, human communication is the only way to win it back.
- The Post-Breach Narrative: Winning Back Trust After the Headlines Fadeon January 20, 2026 at 9:00 am
Understanding trust as a strategic asset.Â
- With New AI Executive Order, Security Burdens Shift to Users And Organizationson January 19, 2026 at 10:00 am
Preparing for the future of AI regulation.
- Is Email the Entry Point to a Well-Rounded Disinformation Attack?on January 8, 2026 at 5:00 am
Email has always been the nervous system of business communication and is trusted, immediate and universal.Â
- Sizing Up Top Tech Trends and Priorities for 2026on December 29, 2025 at 5:00 am
A look into areas security professionals and digital trust practitioners should be mindful of in the year to come.
- Cybersecurity Stagnation in Healthcare: The Hidden Financial Costson December 23, 2025 at 9:00 am
Rising breach costs and the financial impact of program immaturity.Â
- Louder Than Words: How Effective Security Defends Brand Reputationby algerj@bnpmedia.com (Jordyn Alger) on December 19, 2025 at 5:00 am
Security leaders can help defend their organization’s reputation through proper protective measures.
- The Most Dangerous 6 Weeks of the Yearon December 11, 2025 at 6:00 am
Attackers are planning around your holidays. The question is whether you’ve done the same.
- A Lack of AI Governance Leads to Additional Security Riskson December 10, 2025 at 5:00 am
Security leaders need concrete AI guidelines to prevent risks.














.webp?t=1769044794)









