Browsing Posts in vSecurity

Logo Commvault

Reading Time: 4 minutesCommvault has announced (on April 29th) a new era in cleanroom technology with the new Commvault Cloud Cleanroom Recovery offering available from now. What is a cleanroom? A cleanroom is an isolated recovery environment that is frequently used for secure cyber recovery scenarios. It’s more than just running a instant recovery or replicated VM in a isolated environment.

Reading Time: 2 minutesVeeam has acquired Coveware, a leading provider in cyber-extortion incident response. Coveware combines aggregated ransomware case data, refined negotiating techniques and sound financial and operational controls to achieve superior ransomware incident response and recovery for our clients. The company created Recon and Unidecrypt, two proprietary software packages for cost analysis and ransomware decryption, respectively.

Reading Time: 3 minutesOn April 16th, CTERA announced the enhancement of its award-winning ransomware protection engine, CTERA Ransom Protect, with active protection against data exfiltration using honeypot decoy techniques. CTERA Ransom Protect is an AI-powered cyber defense engine integrated into the CTERA global file system, providing zero-day protection against widespread ransomware attacks.

Reading Time: 2 minutesCTERA Vault is a Read Many (WORM) protection technology that protects against risks related to data tampering. In simple terms, CTERA Vault allows data to be written to a storage system once and then prevents any modifications and/or deletions. Think of it as a security vault for your data that is immune to ransomware, accidental deletions, and unwanted changes.

Reading Time: 2 minutesXZ Utils (formerly LZMA Utils) provides a general-purpose data-compression library plus command-line tools. March 29, 2024 is a day that will hardly be forgotten by the open source community: Andres Freund disclosed his findings about the compromise in the XZ Utils, which would enable an attacker to silently gain access to a targeted affected system. CVE-2024-3094 is a vulnerability discovered in the open-source library XZ Utils that stems from malicious code that was pushed into the library by one of its maintainers.

Reading Time: 5 minutesScality,a global leader in reliable, secure and sustainable data storage software, today announced the results of a survey of 500 IT decision-makers across France, Germany, the UK and the US to gain insight into the role immutable data storage plays in an organisation’s overall cybersecurity strategy. Key findings reveal:

Reading Time: 7 minutesTo implement some encryption solutions (like VM encryption, backup encryption, storage encryption) you need to manage symmetric keys in a secure way. Key management has always been solved with proprietary solutions. Each vendor have offered in the past their own key management server/client combination, but as the complexity of datacenters increased, this designed has shown its limits. If you have multiple components, all in need of security keys, why you would need to run multiple key management solutions? But in order to have a common solution, you first would need a protocol to let all […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright