fbpx

Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

Guide to DORA and its Impact on Storage & Backup ICT Assets – Part 1

Guide to DORA and its Impact on Storage & Backup ICT Assets – Part 1

The EU Digital Operational Resilience Act (DORA) marks a pivotal milestone in safeguarding the financial sector from the growing threat of cyberattacks.   Designed to bolster the
Read more

Trust But Verify: The Challenge With Outsourcing Security Of Your Storage & Backups To MSPs

Organizations are increasingly outsourcing their storage and backup operations to managed service providers (MSPs). While this strategy can offer cost savings, it also introduces severe risks,

Read more

Catch My Drift? How To Easily Manage Configuration Drift In Your Storage & Backup Systems 

Configuration drift happens when the configurations of storage & backup systems and software deviate from a baseline or standard configuration over time. When this happens, it

Read more

Backup Blog Bites #5: Building a Solid Backup Asset Inventory

Given the importance of backup and recovery systems in any organization, maintaining a comprehensive and up-to-date inventory of all backup infrastructure is critical.  A general-purpose inventory

Read more

Backup Blog Bites #4: How To Validate The Configuration Of Your Immutable Backups

The integration between backup software and a disk array is crucial for implementing immutable backups. To achieve backup immutability, the backup software needs to leverage the

Read more

Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist 

Since backups are becoming lucrative targets for cybercriminals, vendors like Cohesity, Commvault, Dell, Rubrik, Veeam and Veritas have responded with new ransomware protection features – including immutability. 

Read more

Storage & Backups Under Attack. This Is What To Do About It

Over the past few months there has been a significant increase in publicized attacks on storage & backup systems, e.g. You can read more about these

Read more

Backup Blog Bites #2: To AD Or Not To AD Your Backup System? That Is The Question 

When it comes to backups, there’s an interesting debate as to whether you should connect your backup systems to Active Directory (AD) or not, and for

Read more

Backup Blog Bites #1: Is Your Immutable Backup Vulnerable to Time Spoofing Attacks?

What this is about?  This time-based attack happens when an attacker manipulates insufficiently-secure time sync configuration to trick the backup systems into thinking that “X” number

Read more

After The Johnson Controls Ransomware Attack, Here’s An 8-Point Security Checklist For Your Backups

On September 27th, Johnson Controls International announced a massive ransomware attack, that encrypted many of the company devices, including VMware ESXi servers. This impacted the company’s

Read more

StorageGuard vs Rapid7 InsightVM: A Comprehensive Comparison

In the world of cybersecurity, staying ahead of threats and vulnerabilities requires a multifaceted approach. Two prominent solutions in this field are StorageGuard and Rapid7 InsightVM. While both tools have distinct focuses, they also complement each other in ways that can significantly enhance an organization’s security posture. In this blog post, we will delve into the key features, benefits, and how these two solutions work together seamlessly.

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

Virtual Panel with Check Point, Qualys and Rapid7: Vulnerability Management 2025 Innovations – January 16

Register
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree