Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

11:11 Systems

Navigating VMware changes: How to minimize upheaval and keep your business moving forward (Webinar)

The word “disruption” gets thrown around a lot when discussing the tech industry. Disruptive technologies. Disruptive ideas. Disruptive companies and business models. Even “disruptive innovation” or its younger cousins, “big-bang disruption” and “new-market disruption.” The list goes on … and on.

Far from fun and games: Why tabletop exercises are key to enhancing cyber resilience.

In the gaming world, one of the most popular types is the simulation category. These games are designed to closely imitate real-world activities. As the player makes decisions and analyzes current conditions the results of their choices and decisions impact what happens next in the game. These types of simulations are often used in role-play games, war games, or even business games. The whole point of such games is to teach the player something about their decisions and their environment.

When the unthinkable happens: Is your organization's disaster recovery strategy providing the right balance?

The founder of the Boy Scouts, Robert Baden-Powell, once said “Be Prepared… the meaning of the motto is that a scout must prepare himself by previous thinking out and practicing how to act on any accident or emergency so that he is never taken by surprise.” Much like the Boy Scouts, IT departments must also embrace the “Be Prepared” motto. Emergencies and accidents are no longer a matter of “if” but “when”.

How To Get The Jump On Ransomware: Address Cyberthreats With Comprehensive Business Continuity Planning

Confucius once said famously, “A man who does not plan long ahead will find trouble at his door.” No truer words could be spoken about today’s cyberthreat landscape. According to Cybersecurity Magazine, ransomware attacks are predicted to surge from occurring every 11 seconds now, to every two seconds over the next decade. As such, business continuity planning has never been more significant to individuals and organizations.

11:11 Systems wins 2024 Cloud Computing Product of the Year Award

Technically awards season has ended, at least when it comes to Hollywood. There. were some big wins for Oppenheimer, and who wasn’t feeling the Kenergy? 2024 is also shaping up as a big year for 11:11, as we’ve already brought home several awards. And now we have been awarded the 2024 Cloud Computing Product of the Year Award for 11:11 Cloud , presented by presented by Cloud Computing Magazine.

World Backup Day and the Importance of Being Prepared

It’s been nearly 365 days since the last World Backup Day, and we’ve got a lot to discuss. Let’s see, I completed my annual rewatch of The Sopranos. I took a deep dive into the SEC’s new cybersecurity rules and the nature of “materiality.” My wife and I finally agreed on a new sectional for the living room. What else … OH YEAH AND WE HAD A KID. Like I said, it’s been quite the year.

Which Cloud Provider Is Secure By Default?

Much like our own blood, data is the lifeblood that flows through the arteries of business today. Organizations must ensure that data is protected appropriately based on that data’s sensitivity, criticality, and regulatory or contractual requirements. These protections are provided through administrative, technical, and physical controls. The primary goal of these controls is to provide preventative, detective, or corrective capabilities.

Making Sense of the SEC's New Rules for Cybersecurity Risk and Disclosure (Part II)

Earlier this week, we debuted our mini-series on the SEC’s new cybersecurity rules. In case you missed it — and, understandably, don’t have the bandwidth to backtrack — Part I explored how the (seemingly perpetual) explosion in data creation, data value, and IT complexity since the dawn of the digital age has come to shape our society. In particular, we note why these trends are responsible for our current IT predicament, namely, the rise in threats, risks, and regulations.