Guide to DORA and its Impact on Storage & Backup ICT Assets – Part 1
The EU Digital Operational Resilience Act (DORA) marks a pivotal milestone in safeguarding the financial sector from the growing threat of cyberattacks. Designed to bolster the
The EU Digital Operational Resilience Act (DORA) marks a pivotal milestone in safeguarding the financial sector from the growing threat of cyberattacks. Designed to bolster the
In part 1 we discussed the security and compliance motivations for implementing a secure configuration baseline for Storage and Backup platforms. And now it’s time to
In the world of information security, dual authorization (also known as the two-person rule, four-eyes principle, or dual control) is a powerful concept designed to enhance
Storage and backup systems are the backbone that support data integrity, availability, confidentiality, and recovery. However, these critical systems are often overlooked in security strategies, leaving
Storage and backup platforms, being the custodians of critical organizational data, have become prime targets for cyber threats. Implementing robust vulnerability scanning practices for these platforms
The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of
On July 29, a critical vulnerability in Acronis Cyber Infrastructure (ACI), tracked as CVE-2023-45249, was highlighted by CISA as being actively exploited by malicious actors. This
Organizations are increasingly outsourcing their storage and backup operations to managed service providers (MSPs). While this strategy can offer cost savings, it also introduces severe risks,
I hear this a lot: “Why do I need to scan my storage & backup systems for security risks? Don’t my storage vendors already do this
OCIE warns of new campaigns launched to penetrate financial organizations and deploy ransomware. Recommends to validate operational resilience.
It’s time to automate the secure configuration of your storage & backup systems.
On March 11, join Dell-Continuity Webinar: Securing Storage & Backup; the Forgotten Threat Vector
Register