Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

The New Battleground: Why Storage and Backup Systems Are Now Top Targets for Cyber Threats

The New Battleground: Why Storage and Backup Systems Are Now Top Targets for Cyber Threats

Surge in Actively Exploited Vulnerabilities In Storage and Backup Systems In the past two months, enterprise storage and backup systems have seen a significant increase in
Read more

Customer Story: Securing National Bank’s Last Line of Defense

Background A leading national bank processes billions of dollars in transactions daily. While its cybersecurity posture was mature, its storage and backup systems had been excluded

Read more

Exploitable Storage and Backup Vulnerabilities: A Growing Threat to Enterprise Security  

On May 1st, enterprise backup vendor, Commvault revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928. That wasn’t the only

Read more

Top 15 Security Controls for Storage & Backup Systems

As cyber threats increasingly target infrastructure-level components, securing your storage and backup systems has become mission-critical. These systems hold the keys to your recovery, and if

Read more

Hidden Risks, Critical Assets: Why It’s Time to Rethink the Security of Your Storage & Backup Systems

When we talk about cybersecurity, storage and backup systems rarely get the spotlight. But in today’s evolving threat landscape, ignoring them can be catastrophic. Recent cyberattacks

Read more

Locking Down Backups: Strengthening Security Posture Against Cyber Threats

Backup security is no longer just about ensuring data availability—it has become a frontline defense against attackers who increasingly view backup systems as high-value targets.   While

Read more

Backups Under Attack. 6 Things To Do About It

Throughout 2024, there was a significant increase in well-publicized attacks on backups…

Read more

The CISOs Guide to Cyber Recovery

The rapid increase in cyberattacks is putting greater pressure on Cyber Resilience and IT Infrastructure teams to ensure the reliability, integrity, and availability of their systems

Read more

Guide to DORA and its Impact on Storage & Backup ICT Assets – Part 1

The EU Digital Operational Resilience Act (DORA) marks a pivotal milestone in safeguarding the financial sector from the growing threat of cyberattacks.   Designed to bolster the

Read more

Best Practices for Setting Secure Configuration Baselines for your Storage & Backup Systems – Part2

In part 1 we discussed the security and compliance motivations for implementing a secure configuration baseline for Storage and Backup platforms. And now it’s time to

Read more

Dual Authorization in Storage and Backup Systems: A Technical Guide 

In the world of information security, dual authorization (also known as the two-person rule, four-eyes principle, or dual control) is a powerful concept designed to enhance

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree