Resource Center
The Myota Blog
Posts about Data protection:
Tea App Breach Exposes a Common Storage Mistake - Here’s How to Avoid It
Recently, the dating review app Tea made headlines for all the wrong reasons. The company disclosed a data breach involving unauthorized...
Critical Veeam Flaws Allow Immutable Backup Compromise
Veeam recently has disclosed critical security flaws (CVSS up to 9.9) that allow malicious actors - including insiders or compromised...
Beyond AWS Credentials: Why the Codefinger Attack Changes Cloud Storage Security
The recent Codefinger ransomware attack targeting AWS S3 buckets highlights something I've been discussing with security teams for years:...
An IT leaders guide to Cloud Storage
"Every person has their own path, but no one's journey is easy." – 19th Century IT philosophers probably
12 Cybersecurity Experts You Should Be Following
Great leaders know their limitations. They have a good sense of what their own areas of expertise are and what their own blind spots may be.
Small Business, Big Target: The Growing Cyber Threat for SMBs
While nation-state and nation-state backed cyberattacks continue to dominate national and global headlines, the majority of ransomware...
Protect Valuable Assets with Myota’s Zero Trust Data Enclave
Challenge:As information security experts intuitively recognize, cyber criminals are drawn to the most valuable targets and the most...
