Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

The Escalating War on Enterprise Backups — and How to Fight Back

The Escalating War on Enterprise Backups — and How to Fight Back

According to recent research by Trend Micro, the ‘Agenda’ ransomware group (aka “Qilin”) has evolved its attack chain to focus on the “last-mile” of enterprise systems
Read more

Exploitable Storage and Backup Vulnerabilities: A Growing Threat to Enterprise Security  

On May 1st, enterprise backup vendor, Commvault revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928. That wasn’t the only

Read more

Top 15 Security Controls for Storage & Backup Systems

As cyber threats increasingly target infrastructure-level components, securing your storage and backup systems has become mission-critical. These systems hold the keys to your recovery, and if

Read more

Hidden Risks, Critical Assets: Why It’s Time to Rethink the Security of Your Storage & Backup Systems

When we talk about cybersecurity, storage and backup systems rarely get the spotlight. But in today’s evolving threat landscape, ignoring them can be catastrophic. Recent cyberattacks

Read more

Locking Down Backups: Strengthening Security Posture Against Cyber Threats

Backup security is no longer just about ensuring data availability—it has become a frontline defense against attackers who increasingly view backup systems as high-value targets.   While

Read more

Backups Under Attack. 6 Things To Do About It

Throughout 2024, there was a significant increase in well-publicized attacks on backups…

Read more

The CISOs Guide to Cyber Recovery

The rapid increase in cyberattacks is putting greater pressure on Cyber Resilience and IT Infrastructure teams to ensure the reliability, integrity, and availability of their systems

Read more

Guide to DORA and its Impact on Storage & Backup ICT Assets – Part 1

The EU Digital Operational Resilience Act (DORA) marks a pivotal milestone in safeguarding the financial sector from the growing threat of cyberattacks.   Designed to bolster the

Read more

Best Practices for Setting Secure Configuration Baselines for your Storage & Backup Systems – Part2

In part 1 we discussed the security and compliance motivations for implementing a secure configuration baseline for Storage and Backup platforms. And now it’s time to

Read more

Dual Authorization in Storage and Backup Systems: A Technical Guide 

In the world of information security, dual authorization (also known as the two-person rule, four-eyes principle, or dual control) is a powerful concept designed to enhance

Read more

Best Practices for Setting Secure Configuration Baselines for your Storage & Backup Systems – Part1

Storage and backup systems are the backbone that support data integrity, availability, confidentiality, and recovery. However, these critical systems are often overlooked in security strategies, leaving

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree