Resource Center
The Myota Blog
Tea App Breach Exposes a Common Storage Mistake - Here’s How to Avoid It
Recently, the dating review app Tea made headlines for all the wrong reasons. The company disclosed a data breach involving unauthorized...
Critical Veeam Flaws Allow Immutable Backup Compromise
Veeam recently has disclosed critical security flaws (CVSS up to 9.9) that allow malicious actors - including insiders or compromised...
The Anatomy of A Ransomware Attack, And How To Protect Your Data
Ransomware attacks continue to surge, with attacks doubling in 2023 compared to 2022. The FBI's Internet Crime Report showed that...
Beyond AWS Credentials: Why the Codefinger Attack Changes Cloud Storage Security
The recent Codefinger ransomware attack targeting AWS S3 buckets highlights something I've been discussing with security teams for years:...
How To Assess Your Company's Cyber Resiliency
With the increase in ransomware attacks and the loss of enterprise data causing long-term disruptions for many businesses, cyber resiliency...
Data Protection Gumbo: When hackers hit your backups, this one thing may save you
{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False,...
The Myth of Magical Immutability
Immutability is taking on an almost magical quality in IT circles. Ransomware has led to the introduction of a dizzying number of...
