Browsing Posts in Sicurezza

Reading Time: 3 minutesMany customers are using backup tools to identify potential dormant threats in their environment and Veeam Backup & Replication adds a lot of malware detaction methods starting with v 12. Whether through periodic manual spot-checks, continuous scheduled scans (for examople with SureBackup), or alert-driven scans, risks can be uncovered without adding overhead to production environments while allowing for a fast response from security teams. However, one of the challenges with searching for threats is knowing what to look for.

Commvault Logo

Reading Time: 7 minutesAt next AWS re:Invent, Commvault will show the new cloud cyber resilience features available on Amazon Web Services (AWS). The Commvault Cloud platform, including its widely deployed SaaS offerings (formerly known as Metallic), will provide AWS customers with cutting-edge solutions for automating data protection, advancing cyber recovery, and simplifying the cloud application rebuild process following a cyber-attack.

Reading Time: 5 minutesDuring the last IT Press Tour #57, I’ve got the opportunity to learn more about an interesting swiss company: Cleondris presented by Christian Plattner (CEO and founder). They have a single product (Cleondris ONE) designed to bring Cyber Resilience for one storage product (NetApp ONTAP). So a very specific solution. Cleondris ONE gives you complete control and flexibility over your NetApp ONTAP data on-premises and in the cloud. Benefit from AI-powered threat detection, advanced ransomware protection, and robust data security. With Cleondris ONE, your data is secure and resilient, enabling your organization to quickly respond to, mitigate, […]

Reading Time: 3 minutesDuring the VMware Explore 2024 in Las Vegas, VMware has introduced the new VMware Cloud Foundation 9 and described some of its features. One of them was Confidential Computing with TDX: a way to provide advanced security by isolating and encrypting workloads, ensuring data integrity and privacy at the hypervisor level. But what is TDX?

Reading Time: 4 minutesIPv4 (Internet Protocol version 4) is a widely used protocol for network communication and is a core component of the TCP/IP stack. But it has some limits, one is the limit in terms of available addresses, expecially if we are talking about public IP. IPv6 (Internet Protocol version 6) was design to resolve all the limitation of IPv4. IPv6 is designated by the Internet Engineering Task Force (IETF) as the successor to IPv4 providing the following benefits:

Reading Time: 2 minutesMicrosoft warned customers to patch a critical TCP/IP remote code execution (RCE) vulnerability that impacts all Windows systems (client and server) using IPv6 stack. The vulnerability is identified as CVE-2024-38063 and it’s a 9.8-out-of-10 on the CVSS severity scale. Note that, on Windows systems the IPv6 is enabled by default and, in the past, Microsoft itself has not recommend disabling IPV6: ” We do not recommend that you disable IPv6 or its components, or some Windows components may not function.” (https://support.microsoft.com/en-us/kb/929852)

Reading Time: 7 minutesA meno che venerdì scorso non eravate in vacanza in modalità completamente off-line (beati voi), di sicuro saprete del venerdì nero (informaticamente parlando) che ha letteralmente paralizzato molti servizi informatici in tutto il mondo (ad esempio il settore trasporto, con voli cancellati o in ritardo di molte ore). Il problema, secondo stime di Microsoft, ha interessato 8,5 milioni di computer basati su Windows. Ma Microsoft non centra, se non indirettamente (perchè solo i sistemi Windows sono stati colpiti). Il blocco informatico non è dovuto ad un attacco, ma è bensì stato causato da un problema […]

© 2024-2011 vInfrastructure Blog | Disclaimer & Copyright