Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Backup

A Comprehensive Guide To The NIST Cybersecurity Framework

Businesses are turning to structured cybersecurity approaches like the NIST Cybersecurity Framework (CSF) to protect data from breaches. Especially since the latter’s cost is expected to reach $10.5 million in 2025. The CSF’s core functions (Govern, Identify, Protect, Detect, Respond, Recover) can help mitigate digital risks.

CVE-2024-42448: Veeam Discloses Critical RCE Vulnerability in Service Provider Console

On December 3, 2024, Veeam disclosed a critical vulnerability within the Veeam Service Provider Console (VSPC), tracked as CVE-2024-42448, which was discovered during internal testing. VSPC is a management tool designed for service providers to manage customer backups. The vulnerability allows a remote threat actor to perform Remote Code Execution (RCE) on the VSPC server machine from an authorized VSPC management agent machine.

How to Backup and Restore OpenShift Virtualization with CloudCasa

In this insightful demo about backing up and restoring containerized virtual machines within the Red Hat OpenShift Virtualization platform. In this video, Martin provides a detailed walkthrough of the OpenShift console, shows how to register and manage your cluster with CloudCasa, and guides you through the steps of executing a backup and restoration of a VM from one OpenShift cluster (on-premise) to another OpenShift cluster hosted in the AWS infrastructure. This tutorial is essential for IT professionals and system administrators seeking to enhance their data protection strategies for containerized environments.

Backup Postgres Database: Key Steps for Data Security

If you manage customer information, financial records, or business intelligence, learning how to backup Postgres databases effectively is a must-have skill. This guide offers practical steps to secure your data, covering various backup types and strategies to keep your information safe and recoverable. We show you how to create a solid backup plan for your Postgres databases, reducing downtime risks and safeguarding your organization’s most valuable asset.

Cyber Resilience Act: What Does It Mean For Your Digital Business?

Software developers push thousands of lines of code every day, helping enterprises shape the tools and applications we all rely on, starting from banking to entertainment. However, we shouldn’t forget that behind every successful deployment lies a hidden challenge – what cyber security measures should be taken to protect the source code, hardware and software products, and critical company and customer data?

[Live streaming] Microsoft 365 Cloud Backup: Overcoming Native Data Protection Limitations

Microsoft 365 remains the backbone of many businesses, essential to their daily operations and success. Yet, this reliance exposes a critical gap – how to protect the data it holds and who’s responsible for its protection. Potential threats to Microsoft 365 data vary from everyday mishaps like accidental deletion to malicious attacks like ransomware. The bottom line is that it’s time to rethink your approach to Microsoft 365 data protection and recovery.

Enhancing AKS Backup with CloudCasa and Azure Arc

As Kubernetes adoption continues to grow, Microsoft Azure Kubernetes Service (AKS) has become a popular choice for deploying and managing containerized applications. To meet the increasing demand for data protection, Microsoft has introduced native backup solutions for AKS. However, there are some gaps in the native AKS backup capabilities that may not fully address the needs of enterprises and Managed Service Providers (MSPs), especially those with diverse environments.

Discover What's New in NAKIVO Backup & Replication v11

NAKIVO Backup & Replication v11 features agentless backup for Proxmox VE, Microsoft 365 backup to cloud, NAS backup to cloud, tenant overview dashboard, source-side backup encryption, and various enhancements to existing functionality. Watch this video to explore the works and benefits of the latest features and capabilities introduced in NAKIVO Backup & Replication.
Featured Post

The Role of Data Recovery in Cyber Resilience

Data Recovery is the key to achieving an effective cyber resilience strategy in the event of a cyber-attack to resume business operational resiliency. It empowers businesses to quickly recover their critical data, minimise downtime, and prevent against potential threats. Data recovery planning is crucial for business continuity, allowing organisations to seamlessly recover data and minimise the impact of an incident.