Remove Article Remove Backup Remove Vulnerability
article thumbnail

The CISOs Guide to Storage & Backup Cyber Resiliency

Solutions Review

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise technology. Data about the security posture of their storage and backup systems is either woefully deficient or missing entirely. This is a misconception, and a dangerous one at that.

article thumbnail

The Critical Role of Safe and Secure Backup System Storage

Solutions Review

Solutions Review’s Premium Content Series is a collection of contributed articles written by industry experts in enterprise software categories. In this feature, SANS Institute Dean of Research Dr. Johannes Ullrich explains the critical role of safe and secure backup system storage.

Backup 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

World Backup Day: Four Data Protection Best Practices to Know by Pure Storage Blog This article originally appeared on SolutionsReview.com. That’s why it’s absolutely critical that organizations invest in a solid backup approach that is embedded in both their infrastructure and culture. But how do you achieve it?

Backup 96
article thumbnail

Cybersecurity Tips: Risk and Vulnerability Management

Security Industry Association

Managing cybersecurity risks and vulnerabilities is a critical activity for any robust security program. Risk management and vulnerability management are performed in tandem to help keep your network safer and more secure. What Is a Vulnerability? Managing Vulnerabilities in Your Environment.

article thumbnail

Catch My Drift? How To Manage Configuration Drift In Storage & Backup Systems

Solutions Review

Continuity’s Doron Youngerwood offers insights on how to manage configuration drift in storage and backup systems. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. Storage and backup system configurations change on a regular basis.

Backup 52
article thumbnail

4 Questions IT Managers Can Ask to Strengthen Data Backup and Resiliency

Solutions Review

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise tech. In this feature, Apricorn ‘s Kurt Markley offers four data backup and resilience questions to ask right now. Opt for secure storage of local backups on portable hardware-encrypted external devices.

Backup 114
article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.