Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection
Given the importance of backup and recovery systems in any organization, maintaining a comprehensive and up-to-date inventory of all backup infrastructure is critical. A general-purpose inventory
The integration between backup software and a disk array is crucial for implementing immutable backups. To achieve backup immutability, the backup software needs to leverage the
Since backups are becoming lucrative targets for cybercriminals, vendors like Cohesity, Commvault, Dell, Rubrik, Veeam and Veritas have responded with new ransomware protection features – including immutability.
Over the past few months there has been a significant increase in publicized attacks on storage & backup systems, e.g. You can read more about these
When it comes to backups, there’s an interesting debate as to whether you should connect your backup systems to Active Directory (AD) or not, and for
What this is about? This time-based attack happens when an attacker manipulates insufficiently-secure time sync configuration to trick the backup systems into thinking that “X” number
On September 27th, Johnson Controls International announced a massive ransomware attack, that encrypted many of the company devices, including VMware ESXi servers. This impacted the company’s
In the world of cybersecurity, staying ahead of threats and vulnerabilities requires a multifaceted approach. Two prominent solutions in this field are StorageGuard and Rapid7 InsightVM. While both tools have distinct focuses, they also complement each other in ways that can significantly enhance an organization’s security posture. In this blog post, we will delve into the key features, benefits, and how these two solutions work together seamlessly.
StorageGuard’s security validation checks cover a wide range of system components, access controls, authentication mechanisms, encryption settings, monitoring configurations, and more. These checks are specifically tailored to ensure that Cohesity DataPlatform adheres to industry best practices and security standards.
To ensure compliance with DORA and to get ahead of the regulators, CISOs should take the following 6 steps to ensure that their storage and backup systems are secure and resilient
It’s time to automate the secure configuration of your storage & backup systems.