Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

Exploited and Exposed: Storage and Backup Systems Are Under Attack 

Exploited and Exposed: Storage and Backup Systems Are Under Attack 

Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems  Enterprise storage and backup systems have become a high-priority target for cybercriminals. In the last
Read more
Image of a blog

How do hackers gain access to your core data? Storage systems may be the weakest link

Part 2 in a series of 4: The what, why, and how of securing storage and backup In part 1 of this series, we discussed the

Read more
Image of 3 people

Why storage security can no longer be left unattended

Part 1 in a series of 4: The what, why, and how of securing storage and backup A fact: Vulnerabilities from within and without are plaguing

Read more

NIST (SP) 800-209: Security Guidelines for Storage Infrastructure

Learn about the new NIST special publication: Security Guidelines for Storage

Read more

SEC alerts financial firms regarding increased risk of ransomware attacks

OCIE warns of new campaigns launched to penetrate financial organizations and deploy ransomware. Recommends to validate operational resilience.

Read more

The Status of Storage and Backup systems related to the Log4J vulnerabilities

A new critical vulnerability (CVE-2021-44228) was identified in Apache Log4J – widely used by numerous applications, services and frameworks. This vulnerability received the highest CVSS severity score of 10.

Read more

The Status of Storage and Backup systems related to the Log4J vulnerabilities

A new critical vulnerability (CVE-2021-44228) was identified in Apache Log4J – widely used by numerous applications, services and frameworks. This vulnerability received the highest CVSS severity score of 10.

Read more

CS NetApp Benchmark

CS Storage Benchmark Series: Our security technical implementation guide for NetApp storage systems.

Read more

CS Dell EMC PowerMax Benchmark | CS Dell EMC VMAX Benchmark

CS Storage Benchmark Series: Our security technical implementation guide for Dell EMC VMAX storage systems, Dell EMC PowerMax storage systems and their storage management hosts.

Read more

Security Configuration Baselines for Enterprise Storage Systems: Is Yours Being Followed?

Storage teams struggle to keep storage systems configured according to the defined security baseline. How can we verify adherence to security baseline? This article explores the options.

Read more

Five Common Storage & Backup Security Misconfigurations

Out of the thousands of storage security configuration issues StorageGuard routinely checks for, we assembled here five common examples to share with our readers

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree