Veeam

How Cisco & Nutanix’s Alliance Impacts Veeam Users

As Josh Druck outlined in his September 14th blog, Veeam has longstanding technical relationships with both Cisco HyperFlex and Nutanix. In this blog, I would like to explore what the recent Cisco and Nutanix global strategic partnership announcement will mean to Veeam customers, or prospective Veeam customers, from a technical perspective.  As you may know, …

How Cisco & Nutanix’s Alliance Impacts Veeam Users Read More »

Understanding Cloud Compliance: A Guide to HIPAA, GDPR, SOX, and More

Introduction In today’s digital landscape, the adoption of cloud computing has transcended beyond just a technological trend; it’s now a business imperative. Companies, irrespective of size or sector, are migrating to cloud services to leverage the advantages of scalability, flexibility, and efficiency. However, this migration comes with its own set of challenges, the most notable …

Understanding Cloud Compliance: A Guide to HIPAA, GDPR, SOX, and More Read More »

Getting Started with Kubernetes Security: A Beginner’s Guide 

Understanding Kubernetes Architecture Kubernetes is an open-source container orchestration platform that automates the deployment, scaling and management of containerized applications. It is increasingly deployed in industry to manage and orchestrate containerized applications. Kubernetes architecture within each cluster is composed of several components, including the master node, worker nodes and various add-ons. The master node is …

Getting Started with Kubernetes Security: A Beginner’s Guide  Read More »

Mastering YARA Rules: Malware Detection and Analysis

Introduction One of the most important ways to safeguard your business is to ensure strong protection against malware attacks. If malware gains a foothold, it can be used to extort money, gather sensitive information, monitor keystrokes or even destroy your network or machines. YARA, which stands for, Yet Another Recursive Acronym, is one of the …

Mastering YARA Rules: Malware Detection and Analysis Read More »

Stay Safe Out There: Reflecting on 20 Years of Cybersecurity Awareness Month

Picture it: you’re about to go out of town for a week and you’ve programmed your home’s smart thermostat to know your schedule so you’re not paying for heating or cooling you’re not using while you’re gone. With 60.4 million U.S. homes using some level of smart home devices in 2023, this is a common …

Stay Safe Out There: Reflecting on 20 Years of Cybersecurity Awareness Month Read More »

Comprehensive Guide to SIEM (Security Information & Event Management)

Security Information & Event Management (SIEM) systems are an essential part of any modern cybersecurity toolbox that helps the SOC collect, detect, investigate and respond to internal and external cyber threats. This critical tool helps cybersecurity teams collect, analyze and perform security operations while maintaining  and ensuring rapid, optimal incident response. We cover a lot …

Comprehensive Guide to SIEM (Security Information & Event Management) Read More »

The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and Triumphing Over Cyberattacks

In the digital age, where information is power, and the battle for data integrity rages on, cyber threats loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital fortresses, wreak havoc and compromise the integrity of business-critical data. In the ever-evolving landscape of cyber …

The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and Triumphing Over Cyberattacks Read More »

Scroll to Top