Remove Article Remove Backup Remove Vulnerability
article thumbnail

Data Resilience: The Key to AI and Cybersecurity

Solutions Review

This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. Similarly, effective cybersecurity measures depend on the availability of accurate and up-to-date data to identify threats, analyze vulnerabilities, and respond to incidents.

article thumbnail

The Crucial Role of Data Forensics in Post-cyberattack Recovery

Pure Storage

Data forensics helps uncover how the attack happened, who was behind it, what data and systems were affected, what vulnerabilities were exploited, and how you can prevent being attacked again. Automated tools, such as an immutable backup solution, can help you quickly collect evidence required for a thorough investigation.

Insurance 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CISOs Guide to Storage & Backup Cyber Resiliency

Solutions Review

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise technology. Data about the security posture of their storage and backup systems is either woefully deficient or missing entirely. This is a misconception, and a dangerous one at that.

article thumbnail

Cybersecurity Tips: Risk and Vulnerability Management

Security Industry Association

Managing cybersecurity risks and vulnerabilities is a critical activity for any robust security program. Risk management and vulnerability management are performed in tandem to help keep your network safer and more secure. What Is a Vulnerability? Managing Vulnerabilities in Your Environment.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

article thumbnail

The Critical Role of Safe and Secure Backup System Storage

Solutions Review

Solutions Review’s Premium Content Series is a collection of contributed articles written by industry experts in enterprise software categories. In this feature, SANS Institute Dean of Research Dr. Johannes Ullrich explains the critical role of safe and secure backup system storage.

Backup 98
article thumbnail

4 Questions IT Managers Can Ask to Strengthen Data Backup and Resiliency

Solutions Review

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise tech. In this feature, Apricorn ‘s Kurt Markley offers four data backup and resilience questions to ask right now. Opt for secure storage of local backups on portable hardware-encrypted external devices.

Backup 114