Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Backup

How to Perform Bare Metal Recovery Using the Direct Streaming Method - BDRSuite

BDRSuite - Bare Metal Recovery - Step-by-Step Guide Welcome to BDRSuite How-to series! In this video, we'll guide you through the process of performing Bare-Metal Recovery using the Direct Streaming method. BDRSuite's Bare-Metal Recovery feature is helpful when dealing with complete system failures, allowing you to restore entire systems (Windows Servers or Workstations), to new or existing hardware.

A Comprehensive Guide To The NIST Cybersecurity Framework

Businesses are turning to structured cybersecurity approaches like the NIST Cybersecurity Framework (CSF) to protect data from breaches. Especially since the latter’s cost is expected to reach $10.5 million in 2025. The CSF’s core functions (Govern, Identify, Protect, Detect, Respond, Recover) can help mitigate digital risks.

CVE-2024-42448: Veeam Discloses Critical RCE Vulnerability in Service Provider Console

On December 3, 2024, Veeam disclosed a critical vulnerability within the Veeam Service Provider Console (VSPC), tracked as CVE-2024-42448, which was discovered during internal testing. VSPC is a management tool designed for service providers to manage customer backups. The vulnerability allows a remote threat actor to perform Remote Code Execution (RCE) on the VSPC server machine from an authorized VSPC management agent machine.

Backup Postgres Database: Key Steps for Data Security

If you manage customer information, financial records, or business intelligence, learning how to backup Postgres databases effectively is a must-have skill. This guide offers practical steps to secure your data, covering various backup types and strategies to keep your information safe and recoverable. We show you how to create a solid backup plan for your Postgres databases, reducing downtime risks and safeguarding your organization’s most valuable asset.

Cyber Resilience Act: What Does It Mean For Your Digital Business?

Software developers push thousands of lines of code every day, helping enterprises shape the tools and applications we all rely on, starting from banking to entertainment. However, we shouldn’t forget that behind every successful deployment lies a hidden challenge – what cyber security measures should be taken to protect the source code, hardware and software products, and critical company and customer data?

[Live streaming] Microsoft 365 Cloud Backup: Overcoming Native Data Protection Limitations

Microsoft 365 remains the backbone of many businesses, essential to their daily operations and success. Yet, this reliance exposes a critical gap – how to protect the data it holds and who’s responsible for its protection. Potential threats to Microsoft 365 data vary from everyday mishaps like accidental deletion to malicious attacks like ransomware. The bottom line is that it’s time to rethink your approach to Microsoft 365 data protection and recovery.

Enhancing AKS Backup with CloudCasa and Azure Arc

As Kubernetes adoption continues to grow, Microsoft Azure Kubernetes Service (AKS) has become a popular choice for deploying and managing containerized applications. To meet the increasing demand for data protection, Microsoft has introduced native backup solutions for AKS. However, there are some gaps in the native AKS backup capabilities that may not fully address the needs of enterprises and Managed Service Providers (MSPs), especially those with diverse environments.

Discover What's New in NAKIVO Backup & Replication v11

NAKIVO Backup & Replication v11 features agentless backup for Proxmox VE, Microsoft 365 backup to cloud, NAS backup to cloud, tenant overview dashboard, source-side backup encryption, and various enhancements to existing functionality. Watch this video to explore the works and benefits of the latest features and capabilities introduced in NAKIVO Backup & Replication.