Loading

Tag: cybersecurity

February 22, 2024

Isolated Recovery Environments: The Next Thing in Cyber Recovery

Cyber threat actors aggressively seek ways to get your data and dollars. Ransomware, phishing, social engineering, and exfiltration are just

July 13, 2023

The New NetBackup Flex 5360 and NetBackup Flex 5260 Appliances

On July 13, 2023 we announced enhanced data protection solutions with the new NetBackup 5260 and 5360 Flex models which

June 21, 2024

Scattered Spider Strikes Again: Build Cyber Resilience Against Advanced Threat Actors

The hacker group Scattered Spider is back in action and has launched a new campaign. You might remember them from

February 14, 2024

Cyber Resilience: A Reality Check On Why It Matters More Than Ever

It’s impossible to overstate the significance of cyber resilience. And Nordic countries may be facing the toughest challenge. According to

January 17, 2024

Multifactor Authentication Made Easy with Flex Appliances

Protecting confidential data has always been a priority, whether it’s your personal banking data or an organization’s trade secrets. The

October 2, 2023

Cybersecurity as a Team Sport

As your organization's data and infrastructure continue to evolve and become more complex, there is an even greater need for

April 22, 2024

Introducing Veritas Cyber Resilience Services

During our Achieving Cyber Resilience with Zero Doubt broadcast, we announced the Veritas Cyber Resilience Services. This includes the Veritas

July 31, 2024

Veritas offers Enhanced Cyber Resiliency for Microsoft 365 Workloads

Veritas announces it’s Alta SaaS Protection is being integrated with Microsoft 365 Backup Storage. This enhances Alta SaaS Protection, making

April 30, 2024

Better Together: Enhancing Data Protection with Veritas and Securonix

When it comes to cyber resilience, staying ahead of evolving threats is paramount. Cyber resilience consists of cyber security and

October 27, 2023

Defend Your Data Estate—Anomaly and Malware Scanning Enhancements

This week, we made the exciting announcement to introduce Veritas 360 Defense, a new architecture that builds on our cyber-resiliency

October 17, 2023

Designing a Data Protection Solution for Rapid Recovery From a Cyber Attack

Cyber attacks are happening at an alarming frequency. Ransom demands are exorbitant and paying the ransom does not guarantee you

November 7, 2024

Automated Threat Hunting for Cyber Recovery and Cyber Security

Threat Hunting for Cyber Recovery and Cyber SecuritySecurity teams leverage threat hunting for proactive detection of obscure and new cyber

April 16, 2024

Insider Secrets: Mastering Tabletop Exercises for Cyber Recovery Success

At cybersecurity events and in recent blog posts, I have mentioned how security and IT teams are coming together, or

March 1, 2024

Veritas Comments on NIST Cybersecurity Framework 2.0 Evolution

The National Institute of Standards and Technology (NIST) has played a pivotal role in shaping the cybersecurity landscape by developing

October 25, 2023

Protect Active Directory with Veritas and Semperis

Cybercriminals don’t stop with theft. They also attempt to deny you access to your own systems. They even try to

April 23, 2024

Veritas Cyber Strategy—Expanding Ecosystem

Last fall, Veritas introduced Veritas 360 Defense architecture, which uniquely combines data protection, data security, and data governance with an

February 15, 2024

Three Key Principles of Cyber Resiliency

Cybersecurity requires much more than prevention. Data lives everywhere — in the cloud, on premises, and at the network edge. As

February 2, 2021

Partnership with impact: Joint Cohesity and Cisco solutions win praise from customers

In today’s digital-first world where both data volume and cybercrime are on the rise, the partnership between Cohesity and Cisco

September 1, 2020

Threat Condition Delta: Attack Imminent

Why global Healthcare business entities are under cyberattack and why it’s not going to stop anytime soonFallout from a breach

April 24, 2025

Introducing the Cohesity Destructive Cyberattack Resilience Maturity Model

The Destructive Cyberattack Resilience Maturity Model is now available to help organizations develop their resilience to destructive cyberattacks such

Loading