Veeam Blog
Filters (Results: 151)
Results: 151
Filters (Results: 151)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Introducing Agent Commander

AI agents are moving quickly from experimentation to operational infrastructure. In many organizations, that growth is outpacing the ability to control them and recover from failures. An agent is only as trustworthy as the data it can access, and the permissions it operates under. Read more
Rehan Jalil
Rehan Jalil

President, Products & Technology

Security Risks of Model Context Protocol: What CISOs Need to Know Before Connecting AI to Enterprise Data

Model Context Protocol (MCP) is getting attention because it makes it easier to connect AI assistants and agents to the systems where work actually happens: APIs, SaaS platforms, operational tools, and internal data sources. From a security perspective, that convenience changes the game. Once an agent can call tools, a single prompt can trigger a chain of actions across multiple systems. Read more
Zack Rossman
Zack Rossman

Tech Lead, VDC AI & Security

Why Zero-Day Downstream Mass Data Extortion Campaigns are Losing Their Bite

Q4 of 2025 was marked by the latest large-scale data theft campaign by the CL0P ransomware gang, this time exploiting a zero-day vulnerability in Oracle E-Business Suite (EBS). The campaign came from a playbook CL0P pioneered nearly five years ago. The strategy involves: purchase a zero-day exploit of a widely used enterprise file transfer or data storage appliance, compromise as many instances as possible before detection, exfiltrate as much data as possible from as many downstream customers as possible, and finally monetize at scale the attack through extortion of each unique downstream party. Read more
Bill Siegel
Bill Siegel

CEO, Coveware by Veeam

Nitrogen Ransomware Bug

Nitrogen ransomware was derived from the previously leaked Conti 2 builder code and is similar to other Conti-based ransomware, but a coding mistake in its ESXi malware causes it to encrypt files with the wrong public key, irreversibly corrupting them. In practice, this means even the threat actor can’t decrypt affected files. If victims don’t have viable backups, they have no way to recover ESXi-encrypted servers. Paying a ransom won’t help in these cases, because any decryption key or tool the attacker provides won’t work. Read more
Bill Siegel
Bill Siegel

CEO, Coveware by Veeam

From Packets to Prompts: How Security is Changing with AI and Why LLM Firewalls Matter

Security evolves alongside what we build. When we built networks, we got network firewalls. When we built web applications, we added web application firewalls (WAFs), API gateways, and application-layer controls. Now that teams are shipping products that can reason over unstructured text, retrieve private data, and trigger actions through tools, security is shifting again. Read more
Ali Salman
Ali Salman

Principal Solutions Architect, EMEA

Top Ransomware Attack Vectors and How to Defend Them

Ransomware isn’t new, but the way attackers gain access keeps evolving. In 2025, human‑targeted tactics and cloud‑based compromise dominate the threat landscape. Phishing emails are only the beginning; today’s campaigns extend through chat platforms, voice calls, and even trusted SaaS integrations. The goal is simple: find one person, one credential, or one misconfigured service that opens the door. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Proxmox High Availability: Ensuring Always‑On Virtualization with Veeam

When we talk about High Availability in virtualization, we’re talking about one thing, keeping workloads running no matter what happens underneath. Proxmox High Availability (HA) automatically restarts virtual machines or containers on healthy nodes if a host fails, ensuring minimal downtime and continuous service availability. Read more
Cody Ault
Cody Ault

Staff Solutions Architect

Staying Compliant, Secure, and Resilient

Modern data protection must be compliant, secure and resilient; not only to pass audits, but to recover with confidence. For most organizations, managing compliance, risk, and security can be a time-consuming, and complex challenge. This is because businesses are impacted every day by internal and external factors that affect growth, strategy and survival. Whether it’s a new regulation to adhere to, a new advancement in technology or even the scare of a cyberattack, it’s critical to have a modern IT strategy that continues to evolve with business and includes its people and processes.

Compliance, governance, and risk are all factors organizations need to address, whether big or small. Think of compliance as the ongoing governance and management of risk. Making sure ... Read more

Kirsten Stoner
Kirsten Stoner

Technologist and Program Lead

Built on Trust: Why Customers Choose Veeam Again and Again

At Veeam, we don’t just build data protection solutions — we build confidence. Every product we deliver is shaped by authentic customer feedback, tested against real-world challenges, and designed to help organizations stay resilient in an environment where downtime isn’t an option. Read more
Abigail Fish
Abigail Fish

Customer Insights Senior Associate