Veeam

What is Cyber Resilience?

Understanding the Framework of Cyber Resilience With the ever-increasing growth across the digital landscape, having a strong security posture is no longer enough. More than ever, organizations of all sizes need to have an end-to-end cyber resiliency strategy. But what exactly is Cyber Resilience? At its core, Cyber Resilience is the ability of an organization …

What is Cyber Resilience? Read More »

How Cisco & Nutanix’s Alliance Impacts Veeam Users

As Josh Druck outlined in his September 14th blog, Veeam has longstanding technical relationships with both Cisco HyperFlex and Nutanix. In this blog, I would like to explore what the recent Cisco and Nutanix global strategic partnership announcement will mean to Veeam customers, or prospective Veeam customers, from a technical perspective.  As you may know, …

How Cisco & Nutanix’s Alliance Impacts Veeam Users Read More »

Understanding Cloud Compliance: A Guide to HIPAA, GDPR, SOX, and More

Introduction In today’s digital landscape, the adoption of cloud computing has transcended beyond just a technological trend; it’s now a business imperative. Companies, irrespective of size or sector, are migrating to cloud services to leverage the advantages of scalability, flexibility, and efficiency. However, this migration comes with its own set of challenges, the most notable …

Understanding Cloud Compliance: A Guide to HIPAA, GDPR, SOX, and More Read More »

Getting Started with Kubernetes Security: A Beginner’s Guide 

Understanding Kubernetes Architecture Kubernetes is an open-source container orchestration platform that automates the deployment, scaling and management of containerized applications. It is increasingly deployed in industry to manage and orchestrate containerized applications. Kubernetes architecture within each cluster is composed of several components, including the master node, worker nodes and various add-ons. The master node is …

Getting Started with Kubernetes Security: A Beginner’s Guide  Read More »

Mastering YARA Rules: Malware Detection and Analysis

Introduction One of the most important ways to safeguard your business is to ensure strong protection against malware attacks. If malware gains a foothold, it can be used to extort money, gather sensitive information, monitor keystrokes or even destroy your network or machines. YARA, which stands for, Yet Another Recursive Acronym, is one of the …

Mastering YARA Rules: Malware Detection and Analysis Read More »

Stay Safe Out There: Reflecting on 20 Years of Cybersecurity Awareness Month

Picture it: you’re about to go out of town for a week and you’ve programmed your home’s smart thermostat to know your schedule so you’re not paying for heating or cooling you’re not using while you’re gone. With 60.4 million U.S. homes using some level of smart home devices in 2023, this is a common …

Stay Safe Out There: Reflecting on 20 Years of Cybersecurity Awareness Month Read More »

Scroll to Top