Veeam Software
Paying the ransom is not a good recovery strategy
A Veeam report has found that 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability to recover data without …

What does prioritizing cybersecurity at the leadership level entail?
Week after week, month after month, shareholder cyber lawsuits hit the news. Capital One settles for $190 million. A class-action lawsuit was filed against Ultimate Kronos …

Paying the ransom is not a good recovery strategy
Businesses are losing the battle when it comes to defending against ransomware attacks, according to a Veeam report, which found that 72% of organizations had partial or …

Veeam Software hires John Jester as CRO
Veeam Software announced that it has appointed John Jester as Chief Revenue Officer (CRO). Jester will lead Veeam’s go-to-market growth strategy and help build upon Veeam’s …

Kasten by Veeam brings Kubernetes backup and disaster recovery for Software AG
Kasten by Veeam announced Software AG has chosen Kasten K10 by Veeam for reliable backup and recovery of ARIS, the company’s premier business process analysis and management …

Infosec products of the month: March 2022
Here’s a look at the most interesting products from the past month, featuring releases from: Actiphy, Anomali, AvePoint, Ciphertex Data Security, Contrast Security, Critical …

Veeam fixes critical RCEs in backup solution (CVE-2022-26500, CVE-2022-26501)
Veeam Software has patched two critical vulnerabilities (CVE-2022-26500, CVE-2022-26501) affecting its popular Veeam Backup & Replication solution, which could be …

Building trust in a zero-trust environment
A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems advanced enough – to spot all …

New infosec products of the week: March 11, 2022
Here’s a look at the most interesting products from the past week, featuring releases from AvePoint, Dasera, Elastic, Imperva, Palo Alto Networks, Reciprocity, SpyCloud, and …

Veeam Backup for Microsoft 365 v6 boosts customers’ data resilience and mitigates SaaS data risks
Veeam Software released the latest version of the company’s fastest growing Software as a Service (SaaS) product — Veeam Backup for Microsoft 365 v6. The backup and recovery …

How to keep pace with rising data protection demands
The disconnect between business expectations and IT’s ability to deliver has never been more impactful, according to a Veeam report, which found that 89% of organizations are …

Backblaze partners with Kasten by Veeam to offer backup and protection for containerized applications
Backblaze announced a new partnership with Kasten by Veeam to enable companies to back up and restore Kubernetes applications using its B2 Cloud Storage service. The …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility