Veeam Blog
Filters (Results: 60)
Results: 60
Filters (Results: 60)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

How Generative AI Can Strengthen Your Security Posture

Cybersecurity teams are under constant pressure to detect threats faster and stay ahead of evolving risks. GenAI combined with Retrieval-Augmented Generation (RAG) techniques that integrate with your IT and operational systems bring a new layer of intelligence to this challenge by not only analyzing signals, but also summarizing context, prioritizing incidents, and suggesting next steps in plain language. Instead of drowning in alerts, security teams gain actionable insights that accelerate response and strengthen resilience. Read more

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more

Akira Exploits the Gaps Between Patching and Identity Security

Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of these cases is a recently mitigated VPN vulnerability in widely deployed enterprise appliances, which Akira has been actively exploiting to gain initial access. What makes this surge particularly concerning is that many of the victim organizations had already applied the vendor’s patch. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal is finished, you discover your data is still lost. Read more

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Data Resilience Maturity Model: Your Questions Answered

Data resilience should be a top priority for all organizations. But what does true resilience look like, and how can companies objectively measure and improve it? Enter the Data Resilience Maturity Model (DRMM), a comprehensive framework designed to help businesses assess their current capabilities, benchmark themselves against industry best practices, and build a roadmap toward greater stability and security. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing

Cyber Resilience Strategies: From Risk to Resilience Report

Ransomware attacks are evolving faster than ever, making cyber resilience a top priority for organizations of all sizes. In this post, our principal product marketing manager, Leah Troscianecki, EMEA field CTO, Edwin Weijdema, and VP of information security, Courtney Elder, answer some of the main questions from Veeam’s Risk to Resilience Report, share real-world insights from the front lines, and offer actionable best practices to help your business prepare for and recover from cyber incidents. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing

Proactive Threat Detection with Recon Scanner for Veeam Data Platform

Cyberattacks continue to accelerate in scale and sophistication, and backup infrastructure has become a priority target. Threat actors understand that compromising backup environments can limit recovery options, conceal malicious activity, and increase pressure during extortion attempts. As a result, organizations need deeper visibility into the servers and systems that support backup and recovery. Read more