Sharon CaroOct 14, 20242 min readNIS2: A Blueprint for Response and Recovery in the Face of Cyberattacks
Oleg VusikerFeb 8, 20242 min readIndustroyer: Fighting Power Grid Malware with Instant Recovery against Wiper Attacks
Oleg VusikerDec 13, 20232 min readElevating Regulatory Excellence: A Cutting-Edge Backup Solution for Pharmaceutical Manufacturing
Oleg VusikerNov 12, 20232 min readBYOVD: Cyber Threats, EDR/XDR Disablement, and the Power of Air-Gap Backups with Instant Recovery
Sharon CaroOct 2, 20233 min readRethinking Cyber Recovery in Critical Infrastructures: The Need for a New Approach
Sharon CaroJul 24, 20234 min readAI in the Shadows: Unveiling AI Tools in Cyber Attacks - An Interview with Gabriel Marcus
Oleg VusikerJul 17, 20232 min readUnmasking the Unseen Threats: Recovering from OT System Cyber Attacks
Sharon CaroMay 29, 20232 min readUnleashing Havoc: Advanced Persistent Threats (APT) on Critical Infrastructures
Sharon CaroMay 18, 20233 min readFoundations in OT Cybersecurity - Crucial Aspects for Ensuring ICS Resilience and Recovery
Sharon CaroApr 24, 20234 min readThe steps you take today will help reduce the impact and power of a ransomware attack
Sharon CaroJan 18, 20232 min readRansomware Attack Recovery; Gartner Reveals the Importance of Modern Backup Infrastructure
Sharon CaroDec 31, 20222 min readHospitals Under Siege: Protecting Against ransomware Attacks and Ensuring Operational Continuity
Anna RibeiroDec 4, 20226 min readAre industrial enterprises prepared with an OT-centric recovery plan?
Sharon CaroNov 20, 20224 min readReducing severity of threat- Cybersecurity mitigation measures as a must