Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

Top 15 Security Controls for Storage & Backup Systems

Top 15 Security Controls for Storage & Backup Systems

As cyber threats increasingly target infrastructure-level components, securing your storage and backup systems has become mission-critical. These systems hold the keys to your recovery, and if
Read more

Storage & Data Protection Trends & Innovations To Watch in 2025

It’s all about the data.  One thing is clear. The “business value” of data continues to grow, making it an organization’s primary piece of intellectual property. And from

Read more

How StorageGuard Can Assist With CISA’s Advised Mitigations For Newly Emerged BlackSuit Ransomware 

In August, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a joint alert about the emergence of BlackSuit ransomware,

Read more

Enhancing Enterprise Security with the Essential Eight and StorageGuard  

The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of

Read more

Exploitable Storage and Backup Vulnerabilities: A Growing Threat to Enterprise Security  

On July 29, a critical vulnerability in Acronis Cyber Infrastructure (ACI), tracked as CVE-2023-45249, was highlighted by CISA as being actively exploited by malicious actors.   This

Read more

Trust But Verify: The Challenge With Outsourcing Security Of Your Storage & Backups To MSPs

Organizations are increasingly outsourcing their storage and backup operations to managed service providers (MSPs). While this strategy can offer cost savings, it also introduces severe risks,

Read more

Catch My Drift? How To Easily Manage Configuration Drift In Your Storage & Backup Systems 

Configuration drift happens when the configurations of storage & backup systems and software deviate from a baseline or standard configuration over time. When this happens, it

Read more

Backup Blog Bites #5: Building a Solid Backup Asset Inventory

Given the importance of backup and recovery systems in any organization, maintaining a comprehensive and up-to-date inventory of all backup infrastructure is critical.  A general-purpose inventory

Read more

Backup Blog Bites #4: How To Validate The Configuration Of Your Immutable Backups

The integration between backup software and a disk array is crucial for implementing immutable backups. To achieve backup immutability, the backup software needs to leverage the

Read more

Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist 

Since backups are becoming lucrative targets for cybercriminals, vendors like Cohesity, Commvault, Dell, Rubrik, Veeam and Veritas have responded with new ransomware protection features – including immutability. 

Read more

Storage & Backups Under Attack. This Is What To Do About It

Over the past few months there has been a significant increase in publicized attacks on storage & backup systems, e.g. You can read more about these

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

Join Our 10-Minute Quick Demo - Tuesday, May 6 at 11 AM ET

Register
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree