Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection
Part 3 in a series of 4: The what, why, and how of securing storage and backup In part 1 of this series, the difference between
Part 2 in a series of 4: The what, why, and how of securing storage and backup In part 1 of this series, we discussed the
Part 1 in a series of 4: The what, why, and how of securing storage and backup A fact: Vulnerabilities from within and without are plaguing
Learn about the new NIST special publication: Security Guidelines for Storage
OCIE warns of new campaigns launched to penetrate financial organizations and deploy ransomware. Recommends to validate operational resilience.
Learn about a new critical security alert from Dell EMC published *today* for the Data Protection Central product
CS Storage Benchmark Series: Our security technical implementation guide for Dell EMC VMAX storage systems, Dell EMC PowerMax storage systems and their storage management hosts.
Storage teams struggle to keep storage systems configured according to the defined security baseline. How can we verify adherence to security baseline? This article explores the options.