article thumbnail

7 Challenges with Applying AI to Data Security—and the Real Way to Solve Them

Pure Storage

7 Challenges with Applying AI to Data Security—and the Real Way to Solve Them by Pure Storage Blog As AI makes headlines and augments the way we work, there’s one area to be cautiously optimistic about: cybersecurity. There isn’t a silver bullet in security, but AI’s false sense of security can be risky.

Security 124
article thumbnail

Four Storage and Backup Security Predictions for 2023

Solutions Review

In this submission, Continuity Software CTO Doron Pinhas offers 2023 predictions for storage and backup security that you need to know. 2022 clearly demonstrated that attacks on data represent the greatest cyber-threat organizations face. Notable data breaches took place at Microsoft, News Corp.,

Backup 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Data Security Challenges, Part 3: Getting Control

Pure Storage

According to Cybersecurity Insiders’ 2022 Cloud Security Report : . Nearly half (47%) of organizations cite “loss of visibility and control” as one of their biggest challenges around securing multi-cloud environments. . In part 2 of our three-part cloud data security blog series, we discussed the issue of complexity.

article thumbnail

Ransomware’s Latest Targets and How to Protect Yourself

Pure Storage

Storage and cloud are now the most common ransomware targets, with vulnerable software and misconfigurations being the most common entry points. . Although storage systems and cloud are the most common targets across the board, networks and IT infrastructure—specifically data protection infrastructure—are also atop the target list.

Backup 89
article thumbnail

Comparing Resilience: Business, Operational, IT, and Cyber – Part Four

Zerto

Some organizations have used the National Insititute of Standards and Technology (NIST) Cyber Security Framework (CSF) , which is based on five core functions: Identify, Protect, Detect, Respond, and Recover, to achieve cyber resilience. From there, data recovery becomes the foundation of every effective cyber resilience strategy.

article thumbnail

Storage and Data Protection News for the Week of June 23; Updates from Cisco, Catalogic Software, Zscaler & More

Solutions Review

Top Storage and Data Protection News for the Week of June 23, 2023 New Arcserve Survey Reveals Ransomware and Data Recovery Vulnerabilities The segment focuses on government IT departments’ approach and experience with ransomware and data recovery preparedness. Read on for more.

Backup 97
article thumbnail

Breaches – Are you on a Hackers Watchlist?

Online Computers

Technology is constantly expanding, and with new technology comes new ways of hacking into seemingly secure data. As technology advances, people tend to forget about outdated technology and are lackadaisical about security. It’s important to ensure companies are well aware of all possible breaches in order to secure them.

Malware 52