Veeam Blog
Filters (Results: 159)
Results: 159
Filters (Results: 159)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Why Agent Commander Changes Everything

A Solutions Architect’s Perspective on the Future of AI Trust

Veeam recently released Agent Commander. As someone who has spent the last decade building enterprise resilience architectures, and the past several years deep in AI security research, I can tell you: This is the product the industry has been waiting for without fully knowing how to ask for it.

Let me explain why.

The Problem We Have Been Solving in Pieces

For years, I have worked with enterprises across the EMEA region deploying backup, disaster recovery, and cyber resilience strategies. The conversations always followed a familiar pattern: Protect the data, recover the data, and prove compliance. The tooling was ... Read more

Ali Salman
Ali Salman

Principal Solutions Architect, EMEA

Introducing Agent Commander

The promise of AI Agents is staggering— intelligent systems that make decisions, use tools, automate complex workflows act as force multipliers for every knowledge worker.  But for every advanced AI Agent that makes headlines for executing complex math proofs or automating scientific research in a lab setting, there are 100s of organizations that are struggling to scale Agents. Read more

Public Sector Cybersecurity: Best Practices for U.S. Government and Defense Agencies

Public sector agencies operate in one of the most complex threat environments in the world. Every day, government IT and security teams defend critical systems, such as citizen record databases and defense networks, against adversaries and ransomware campaigns. Read more
Mark Bentkower
Mark Bentkower

Principal Technologist, Americas

Emma Lutton
Emma Lutton

Senior Federal Marketing Manager

Security Risks of Model Context Protocol: What CISOs Need to Know Before Connecting AI to Enterprise Data

Model Context Protocol (MCP) is getting attention because it makes it easier to connect AI assistants and agents to the systems where work actually happens: APIs, SaaS platforms, operational tools, and internal data sources. From a security perspective, that convenience changes the game. Once an agent can call tools, a single prompt can trigger a chain of actions across multiple systems. Read more
Zack Rossman
Zack Rossman

Tech Lead, VDC AI & Security

Why Zero-Day Downstream Mass Data Extortion Campaigns are Losing Their Bite

Q4 of 2025 was marked by the latest large-scale data theft campaign by the CL0P ransomware gang, this time exploiting a zero-day vulnerability in Oracle E-Business Suite (EBS). The campaign came from a playbook CL0P pioneered nearly five years ago. The strategy involves: purchase a zero-day exploit of a widely used enterprise file transfer or data storage appliance, compromise as many instances as possible before detection, exfiltrate as much data as possible from as many downstream customers as possible, and finally monetize at scale the attack through extortion of each unique downstream party. Read more
Bill Siegel
Bill Siegel

CEO, Coveware by Veeam

Nitrogen Ransomware Bug

Nitrogen ransomware was derived from the previously leaked Conti 2 builder code and is similar to other Conti-based ransomware, but a coding mistake in its ESXi malware causes it to encrypt files with the wrong public key, irreversibly corrupting them. In practice, this means even the threat actor can’t decrypt affected files. If victims don’t have viable backups, they have no way to recover ESXi-encrypted servers. Paying a ransom won’t help in these cases, because any decryption key or tool the attacker provides won’t work. Read more
Bill Siegel
Bill Siegel

CEO, Coveware by Veeam

From Packets to Prompts: How Security is Changing with AI and Why LLM Firewalls Matter

Security evolves alongside what we build. When we built networks, we got network firewalls. When we built web applications, we added web application firewalls (WAFs), API gateways, and application-layer controls. Now that teams are shipping products that can reason over unstructured text, retrieve private data, and trigger actions through tools, security is shifting again. Read more
Ali Salman
Ali Salman

Principal Solutions Architect, EMEA