Yaniv Valik

VP Product Management at Continuity Software

The New Battleground: Why Storage and Backup Systems Are Now Top Targets for Cyber Threats

Surge in Actively Exploited Vulnerabilities In Storage and Backup Systems In the past two months, enterprise storage and backup systems have seen a significant increase in

Read more

Customer Story: Securing National Bank’s Last Line of Defense

Background A leading national bank processes billions of dollars in transactions daily. While its cybersecurity posture was mature, its storage and backup systems had been excluded

Read more

Exploitable Storage and Backup Vulnerabilities: A Growing Threat to Enterprise Security  

On May 1st, enterprise backup vendor, Commvault revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928. That wasn’t the only

Read more

Top 15 Security Controls for Storage & Backup Systems

As cyber threats increasingly target infrastructure-level components, securing your storage and backup systems has become mission-critical. These systems hold the keys to your recovery, and if

Read more

Hidden Risks, Critical Assets: Why It’s Time to Rethink the Security of Your Storage & Backup Systems

When we talk about cybersecurity, storage and backup systems rarely get the spotlight. But in today’s evolving threat landscape, ignoring them can be catastrophic. Recent cyberattacks

Read more

Guide to DORA and its Impact on Storage & Backup ICT Assets – Part 1

The EU Digital Operational Resilience Act (DORA) marks a pivotal milestone in safeguarding the financial sector from the growing threat of cyberattacks.   Designed to bolster the

Read more

Best Practices for Setting Secure Configuration Baselines for your Storage & Backup Systems – Part2

In part 1 we discussed the security and compliance motivations for implementing a secure configuration baseline for Storage and Backup platforms. And now it’s time to

Read more

Dual Authorization in Storage and Backup Systems: A Technical Guide 

In the world of information security, dual authorization (also known as the two-person rule, four-eyes principle, or dual control) is a powerful concept designed to enhance

Read more

Best Practices for Setting Secure Configuration Baselines for your Storage & Backup Systems – Part1

Storage and backup systems are the backbone that support data integrity, availability, confidentiality, and recovery. However, these critical systems are often overlooked in security strategies, leaving

Read more

Where Vulnerability Scanners Fall Short (Hint: Its Related to Your Storage & Backup Environment) 

Storage and backup platforms, being the custodians of critical organizational data, have become prime targets for cyber threats. Implementing robust vulnerability scanning practices for these platforms

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree