Author name: auto feeder

Veeam in a Multi-Hypervisor World

The hypervisor landscape is undergoing significant change. With VMware’s acquisition by Broadcom and the resulting strategic shifts, new opportunities are emerging for alternative virtualization platforms. This technological evolution is bringing fresh momentum to the IT market – along with new challenges in data protection. Veeam is more than just backup for VMware environments. Our commitment …

Veeam in a Multi-Hypervisor World Read More »

Fortify Cyber Resilience Through Hyperautomation with Veeam + Torq

Cyberthreats continue to expand in frequency and complexity. They increase pressure on security operations and IT teams to preempt, detect, respond to, and recover from attacks faster, more accurately and confidently. Many organizations remain hindered by limited visibility, fragmented tools, and manual processes. These obstructions and complexities slow their ability to respond effectively to a …

Fortify Cyber Resilience Through Hyperautomation with Veeam + Torq Read More »

AWS Weekly Roundup: SQS fair queues, CloudWatch generative AI observability, and more (July 28, 2025)

To be honest, I’m still recovering from the AWS Summit in New York, doing my best to level up on launches like Amazon Bedrock AgentCore (Preview) and Amazon Simple Storage Service (S3) Vectors. There’s a lot of new stuff to learn! Meanwhile, it’s been an exciting week for AWS builders focused on reliability and observability. …

AWS Weekly Roundup: SQS fair queues, CloudWatch generative AI observability, and more (July 28, 2025) Read More »

Clean Recovery and Business Continuity: Expert Insights from Veeam and Coveware

Recovery isn’t just about getting systems back online; it’s about proving that IT operations are essential to business continuity. Veeam’s Leah Troscianecki sat down with Ray Umerley, Field CISO, Coveware by Veeam, for a tactical conversation about what actually happens when ransomware hits, and how clean recovery can turn the tide from operational fire drills …

Clean Recovery and Business Continuity: Expert Insights from Veeam and Coveware Read More »

Targeted social engineering is en vogue as ransom payment sizes increase

“Don’t say the “S…” word. But which adjective starting with S are we talking about? Three specifically come to mind in Q2, as these groups were both prolific in the sheer volume of attacks and novel iterations of social engineering in their intrusion vectors. Below, we dissect each one. Scattered SpiderAttack Approach: TargetedCharacterized By: Social …

Targeted social engineering is en vogue as ransom payment sizes increase Read More »

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup

Choosing a backup solution for your Microsoft 365 SaaS environment isn’t just a checkbox for IT, it’s a make-or-break decision for your entire business. The stakes are high: misconfigurations, accidental deletions, unauthorized data access, and compliance violations are everywhere, and the cost of a failed backup solution in a critical moment can have devastating business …

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup Read More »

AWS Weekly Roundup: Kiro, AWS Lambda remote debugging, Amazon ECS blue/green deployments, Amazon Bedrock AgentCore, and more (July 21, 2025)

I’m writing this as I depart from Ho Chi Minh City back to Singapore. Just realized what a week it’s been, so let me rewind a bit. This week, I tried my first Corne keyboard, wrapped up rehearsals for AWS Summit Jakarta with speakers who are absolutely raising the bar, and visited Vietnam to participate …

AWS Weekly Roundup: Kiro, AWS Lambda remote debugging, Amazon ECS blue/green deployments, Amazon Bedrock AgentCore, and more (July 21, 2025) Read More »

YARA Rules Guide: What They Are and How to Write Them

YARA (Yet Another Recursive Acronym) rules are powerful pattern-matching tool used by security teams to  identify and classify malware based on known signature, strings, and behaviors. In backup recovery, YARA scanning adds a valuable layer of protection. Combined with immutable backups and secure restore workflow, YARA rules ensure safe and clean recovery. In this article, …

YARA Rules Guide: What They Are and How to Write Them Read More »

Backing Up Microsoft Entra ID Conditional Access Policies Matters

Veeam automates the backup and restore of conditional access policies for full protection. Conditional access policies in Microsoft Entra ID (formerly Azure AD) are at the heart of modern identity security. They determine who gets access to what, under which conditions, based on factors like user identity, device state, location, and application sensitivity. But these …

Backing Up Microsoft Entra ID Conditional Access Policies Matters Read More »

Simplify serverless development with console to IDE and remote debugging for AWS Lambda

Today, we’re announcing two significant enhancements to AWS Lambda that make it easier than ever for developers to build and debug serverless applications in their local development environments: console to IDE integration and remote debugging. These new capabilities build upon our recent improvements to the Lambda development experience, including the enhanced in-console editing experience and …

Simplify serverless development with console to IDE and remote debugging for AWS Lambda Read More »

Scroll to Top