
Bikash Roy Choudhury
Articles
-
Jun 13, 2024 |
blog.purestorage.com | Andy Stone |Bikash Roy Choudhury |Carey Wodehouse
With any ransomware attack or other security event, there’s going to be a before, a during, and an after phase. To understand how to protect your organization at each phase is to understand how an attack unfolds. Each phase also requires its own unique approach to minimize the damage from a security breach. In this article, I’ll start with the before phase of an attack and discuss how to close the gaps that create vulnerabilities and inroads for attackers.
-
Jun 13, 2024 |
blog.purestorage.com | Andy Stone |Bikash Roy Choudhury |Carey Wodehouse
In this article, I’ll cover the during of an attack: the critical decisions you’ll be faced with, whom you should reach out to first, and key steps to take as you begin your recovery. This is where you’ll put your disaster recovery plan into action. “You can write as many things as you want down, you can practice as often as you can, and you need to.
-
Jun 13, 2024 |
blog.purestorage.com | Andy Stone |Bikash Roy Choudhury |Carey Wodehouse
Hopefully you’ve followed the necessary cyber recovery steps to prepare for the “before” and “during” of an attack. Here, I’ll discuss what to do next as you bounce back, reduce reputational damage and risk, and minimize the overall cost to your organization. In a recent Pure roundtable, four top CISOs discussed what organizations should really do in the moment post-attack. “Counter activity is important, but reactive activity is even more important,” one CISO explained.
-
May 31, 2024 |
blog.purestorage.com | Carey Wodehouse |Eric Burgener |Bikash Roy Choudhury |Julie Levitch
SummaryToday’s IT environments have become seemingly perimeter-less. Traditional security tools, such as firewalls, weren’t built to tackle the new network perimeter. Instead, the focus should be on better orchestration for identity. Once upon a time, when all enterprise computing happened on premises, the network perimeter was easy to define. Antivirus software and a firewall with detection and prevention were all that we needed to stay secure.
-
Jan 18, 2024 |
blog.purestorage.com | Bikash Roy Choudhury |Melody Zacharias |Diane Saucier |Jeff Lamothe
As I reflect on the close of the fiscal year and my first year at Pure Storage, Career Week is still fresh on my mind. From the quality of discussions, commitment from our leaders, and engagement from our talent, it truly was a superb experience. As we roll into Q1 and set our sights, I wanted to recap the week and its connection to driving meaningful talent development experiences, readiness, and organizational success.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →