Veeam Blog
Filters (Results: 1602)
Results: 1602
Filters (Results: 1602)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Nitrogen Ransomware Bug

Nitrogen ransomware was derived from the previously leaked Conti 2 builder code and is similar to other Conti-based ransomware, but a coding mistake in its ESXi malware causes it to encrypt files with the wrong public key, irreversibly corrupting them. In practice, this means even the threat actor can’t decrypt affected files. If victims don’t have viable backups, they have no way to recover ESXi-encrypted servers. Paying a ransom won’t help in these cases, because any decryption key or tool the attacker provides won’t work. Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

From Packets to Prompts: How Security is Changing with AI and Why LLM Firewalls Matter

Security evolves alongside what we build. When we built networks, we got network firewalls. When we built web applications, we added web application firewalls (WAFs), API gateways, and application-layer controls. Now that teams are shipping products that can reason over unstructured text, retrieve private data, and trigger actions through tools, security is shifting again. Read more

Identity in 2025: Lessons Learned and What Comes Next in 2026

For years, security leaders have warned that “the perimeter is obsolete.” In 2025, the rise of AI and identity as a new attack surface confirms something even more consequential: The perimeter did not disappear; it only moved. Today, the perimeter is identity. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate

Top Ransomware Attack Vectors and How to Defend Them

Ransomware isn’t new, but the way attackers gain access keeps evolving. In 2025, human‑targeted tactics and cloud‑based compromise dominate the threat landscape. Phishing emails are only the beginning; today’s campaigns extend through chat platforms, voice calls, and even trusted SaaS integrations. The goal is simple: find one person, one credential, or one misconfigured service that opens the door. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Why Kubernetes Security, Compliance, and Observability Need a New Mindset

Kubernetes is everywhere; it’s the de facto orchestration layer for modern infrastructure. Thanks to its scalability, declarative management, and ability to dynamically allocate resources across heterogeneous environments, Kubernetes powers everything from cloud-native applications to virtual machines (VMs) and AI. However, as we rush to modernize our stacks, containerize all the things, and deploy our apps, are we ensuring resilience and are we built to withstand the next generation of attacks?

Unlike traditional applications, Kubernetes workloads are ephemeral, scalable, and constantly shifting. This flexibility, while powerful, also introduces significant data protection complexity. Your security and compliance strategy must keep up with continuous changes, and between misconfigurations, ransomware attacks, and compliance gaps, the stakes are higher than ever before.

Kubernetes changes the data protection ... Read more

Megan Gay
Megan Gay

Director, Global Campaigns

Bryant Schuck
Bryant Schuck

Principal Product Manager

Proxmox High Availability: Ensuring Always‑On Virtualization with Veeam

When we talk about High Availability in virtualization, we’re talking about one thing, keeping workloads running no matter what happens underneath. Proxmox High Availability (HA) automatically restarts virtual machines or containers on healthy nodes if a host fails, ensuring minimal downtime and continuous service availability. Read more
Cody Ault
Cody Ault

Staff Solutions Architect

Migrating VMware to OpenShift: Some Practical Guidance and Best Practices

Migrating and/or replatforming can be intimidating. And for good reason — there are often many complex and disparate systems with varying levels of tech debt, multiple teams, stakeholders, and business units involved. They need to be consulted, assist with pre- and post-migration activities, and often have aggressive timelines with little flexibility in terms of downtime or maintenance windows. Read more
Matt Slotten
Matt Slotten

Principal Solutions Architect, Veeam Kasten

Critical Infrastructure Cybersecurity: Frameworks, Risks, and Resilience Strategies

Critical infrastructure cybersecurity protects the essential systems that keep society running: Power grids, water treatment plants, hospitals, transportation networks, and communications. These environments face constant threats from ransomware groups and state‑sponsored attackers seeking to disrupt operations or test national defenses. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager