Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

Top 15 Security Controls for Storage & Backup Systems

Top 15 Security Controls for Storage & Backup Systems

As cyber threats increasingly target infrastructure-level components, securing your storage and backup systems has become mission-critical. These systems hold the keys to your recovery, and if
Read more

Hidden Risks, Critical Assets: Why It’s Time to Rethink the Security of Your Storage & Backup Systems

When we talk about cybersecurity, storage and backup systems rarely get the spotlight. But in today’s evolving threat landscape, ignoring them can be catastrophic. Recent cyberattacks

Read more

Locking Down Backups: Strengthening Security Posture Against Cyber Threats

Backup security is no longer just about ensuring data availability—it has become a frontline defense against attackers who increasingly view backup systems as high-value targets.   While

Read more

Backups Under Attack. 6 Things To Do About It

Throughout 2024, there was a significant increase in well-publicized attacks on backups…

Read more

The CISOs Guide to Cyber Recovery

The rapid increase in cyberattacks is putting greater pressure on Cyber Resilience and IT Infrastructure teams to ensure the reliability, integrity, and availability of their systems

Read more

Guide to DORA and its Impact on Storage & Backup ICT Assets – Part 1

The EU Digital Operational Resilience Act (DORA) marks a pivotal milestone in safeguarding the financial sector from the growing threat of cyberattacks.   Designed to bolster the

Read more

Best Practices for Setting Secure Configuration Baselines for your Storage & Backup Systems – Part2

In part 1 we discussed the security and compliance motivations for implementing a secure configuration baseline for Storage and Backup platforms. And now it’s time to

Read more

Dual Authorization in Storage and Backup Systems: A Technical Guide 

In the world of information security, dual authorization (also known as the two-person rule, four-eyes principle, or dual control) is a powerful concept designed to enhance

Read more

Best Practices for Setting Secure Configuration Baselines for your Storage & Backup Systems – Part1

Storage and backup systems are the backbone that support data integrity, availability, confidentiality, and recovery. However, these critical systems are often overlooked in security strategies, leaving

Read more

Where Vulnerability Scanners Fall Short (Hint: Its Related to Your Storage & Backup Environment) 

Storage and backup platforms, being the custodians of critical organizational data, have become prime targets for cyber threats. Implementing robust vulnerability scanning practices for these platforms

Read more

Five Backup Lessons Learned – From The UnitedHealth Ransomware Attack

UnitedHealth Congressional Testimony Reveals Failed Backup Strategy The ransomware attack on UnitedHealth earlier this year is quickly becoming the healthcare industry’s version of Colonial Pipeline, prompting congressional

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

Join Our 10-Minute Quick Demo - Tuesday, May 6 at 11 AM ET

Register
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree