Enhancing Enterprise Security with the Essential Eight and StorageGuard
The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of
The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of
On July 29, a critical vulnerability in Acronis Cyber Infrastructure (ACI), tracked as CVE-2023-45249, was highlighted by CISA as being actively exploited by malicious actors. This
Organizations are increasingly outsourcing their storage and backup operations to managed service providers (MSPs). While this strategy can offer cost savings, it also introduces severe risks,
I hear this a lot: “Why do I need to scan my storage & backup systems for security risks? Don’t my storage vendors already do this
OCIE warns of new campaigns launched to penetrate financial organizations and deploy ransomware. Recommends to validate operational resilience.
Storage teams struggle to keep storage systems configured according to the defined security baseline. How can we verify adherence to security baseline? This article explores the options.
Out of the thousands of storage security configuration issues StorageGuard routinely checks for, we assembled here five common examples to share with our readers
StorageGuard provides continuous storage system security configuration change tracking and facilitates automated healing of storage security risks
BB&T Bank and Hitachi: Which company is responsible for the actions or inactions that led to BB&T’s February 2018 outage?
Security features insufficient; misconfigurations, maintenance and change practices must be addressed. (Data Security Advisor™ can help here!)
It’s time to automate the secure configuration of your storage & backup systems.
On October 29, join Dell-Continuity Webinar: 4 Fundamental Strategies To Secure Your Storage & Backup
Register