Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection
The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of
On July 29, a critical vulnerability in Acronis Cyber Infrastructure (ACI), tracked as CVE-2023-45249, was highlighted by CISA as being actively exploited by malicious actors. This
Organizations are increasingly outsourcing their storage and backup operations to managed service providers (MSPs). While this strategy can offer cost savings, it also introduces severe risks,
Configuration drift happens when the configurations of storage & backup systems and software deviate from a baseline or standard configuration over time. When this happens, it
Given the importance of backup and recovery systems in any organization, maintaining a comprehensive and up-to-date inventory of all backup infrastructure is critical. A general-purpose inventory
The integration between backup software and a disk array is crucial for implementing immutable backups. To achieve backup immutability, the backup software needs to leverage the
Since backups are becoming lucrative targets for cybercriminals, vendors like Cohesity, Commvault, Dell, Rubrik, Veeam and Veritas have responded with new ransomware protection features – including immutability.
Over the past few months there has been a significant increase in publicized attacks on storage & backup systems, e.g. You can read more about these
When it comes to backups, there’s an interesting debate as to whether you should connect your backup systems to Active Directory (AD) or not, and for
What this is about? This time-based attack happens when an attacker manipulates insufficiently-secure time sync configuration to trick the backup systems into thinking that “X” number
It’s time to automate the secure configuration of your storage & backup systems.
On March 11, join Dell-Continuity Webinar: Securing Storage & Backup; the Forgotten Threat Vector
Register