Data protection Cyber Resiliency Featured CyberStorge cloud storage An IT leaders guide to Cloud Storage "Every person has their own path, but no one's journey is easy." – 19th Century IT philosophers probably 23 December, 2023
Data protection Disaster recovery Veeam Hardening Backup Strategies with Myota and Veeam 13 December, 2023
Gartner Cloud backup Disaster recovery A Brief, Incomplete, and Mostly Wrong History of BC/DR 1988: The Accidental Birth of RAID Legend has it that RAID (Redundant Array of Independent Disks) was invented when a clumsy IT intern at... 12 December, 2023
Data backup Data recovery Cloud backup Disaster recovery 3-2-1 Backup Evolution: Modern Strategies for Data Protection In the realm of data protection, the 3-2-1 backup strategy has long been a cornerstone, guiding individuals and organizations in... 12 December, 2023
Myota Named Sample Vendor for Cyberstorage in Gartner® Hype Cycle™ At Myota, we believe that centralized and back-end storage should be as protected from Human Operated Ransomware as endpoint systems.Today... 08 July, 2022
Zero trust How to Implement Zero Trust Architecture At a time when ransomware attacks and data breaches are inevitable, it’s clear a zero trust security strategy is your best defense. The... 15 June, 2022
Ransomware attacks Why Education Data Security Is More Important Than Ever The education sector has become one of the most frequent targets of ransomware attacks and other cybercrime. In one high-profile example,... 17 May, 2022
Cyber Resiliency How Can You Improve Your Security Posture When Threats Are Everywhere? The director of the US Cybersecurity & Infrastructure Security Agency recently acknowledged an unsettling truth with implications far... 06 April, 2022
Trends SecureWorld 2022: Four Emerging Themes For Cybersecurity Leaders After two years of webinars and virtual conferences, it was great to connect in person with some of the most innovative cybersecurity... 05 April, 2022
Ransomware attacks Why Manufacturing Is The Biggest Target For Ransomware Attacks Data security in the manufacturing industry isn’t always held to the higher standards of industries like finance or insurance, but the... 21 March, 2022
Data protection Cyber Resiliency Featured CyberStorge cloud storage An IT leaders guide to Cloud Storage 23 December, 2023
Featured The Myota Methodology What The Byzantine Generals’ Problem Means for Managing Data Risk 15 December, 2021
Data protection Featured How Unstructured Data Makes Your Company Vulnerable To Attacks 28 October, 2021