<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Continuity™</title>
	<atom:link href="http://www.continuitysoftware.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.continuitysoftware.com/</link>
	<description>Vulnerability management for storage</description>
	<lastBuildDate>Mon, 05 Jan 2026 14:42:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>What Security Leaders Need to Know About ISO27040 – Storage &#038; Backup Security</title>
		<link>https://www.continuitysoftware.com/blog/what-security-leaders-need-to-know-about-iso-27040-storage-backup-security/</link>
		
		<dc:creator><![CDATA[Doron Pinhas]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 12:31:22 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/blog/ai-has-changed-the-rules-of-cyber-defense-heres-how-to-respond-2/</guid>

					<description><![CDATA[<p>For years, enterprise security programs have focused heavily on endpoints, networks, and applications – while storage and backup systems quietly became one of the most attractive</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/what-security-leaders-need-to-know-about-iso-27040-storage-backup-security/">What Security Leaders Need to Know About ISO27040 – Storage &amp; Backup Security</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>For years, enterprise security programs have focused heavily on endpoints, networks, and applications – while storage and backup systems quietly became one of the most attractive attack surfaces in the environment. That gap is now impossible to ignore.</p>



<p>The release of <a href="https://www.iso.org/standard/80194.html" target="_blank" rel="noreferrer noopener"><strong>ISO/IEC 27040:2024 – Storage Security</strong></a> marks a pivotal moment for enterprises that care about cyber resilience and recoverability. It is the first truly comprehensive, globally recognized standard dedicated specifically to securing storage and backup systems – and its timing couldn’t be more critical.</p>



<p class="has-medium-font-size"><strong>Storage and Backup: The Last Line of Defense – and a Prime Target</strong></p>



<p>Attackers are exploiting the fact that storage and backup environments are often less monitored, less hardened, and poorly integrated into vulnerability management programs. In many organizations, storage &amp; backup systems still operate with legacy protocols, excessive privileges, weak authentication, and minimal logging – conditions that attackers actively seek out.</p>



<p>The consequences are severe: data theft, data destruction, operational disruption, regulatory exposure, and long-term reputational damage.</p>



<p class="has-medium-font-size"><strong>What Makes ISO/IEC 27040 Different &#8211; and Important</strong></p>



<p>ISO/IEC 27040:2024 is not a minor update. It is a major overhaul of the outdated 2015 edition, designed to reflect modern storage architectures, threat models, and regulatory expectations.</p>



<p><em>Key characteristics include:</em></p>



<ul class="wp-block-list">
<li>220 storage security guidelines, with 188 defined controls that establish a baseline for secure storage operations</li>



<li>A clear distinction between guidance and mandatory requirements, particularly around encryption, logging, access control, protocol hardening, and secure sanitization</li>



<li>Deep alignment with the broader ISO/IEC 27000 family, including ISO 27001 and ISO 27002, ensuring storage security is integrated into existing governance frameworks rather than treated as a side project</li>
</ul>



<p>Most importantly, ISO 27040 acknowledges that storage security drifts over time. Configuration changes, firmware upgrades, evolving vendor guidance, and newly discovered vulnerabilities all erode security posture unless continuously validated.</p>



<p class="has-medium-font-size"><strong>From Policy to Practice: What ISO 27040 Actually Requires</strong></p>



<p>Unlike high-level security frameworks, ISO 27040 goes deep into the technical realities of storage &amp; backup environments. It covers:</p>



<ul class="wp-block-list">
<li>Strong authentication and access control, including multi-factor authentication and separation of duties</li>



<li>Encryption requirements for data at rest and in motion, with minimum cryptographic strength</li>



<li>Protocol hardening, including secure configurations for NFS, SMB, iSCSI, Fibre Channel, NVMe, and object storage</li>



<li>Comprehensive logging and monitoring, with protected log retention</li>



<li>Immutability, snapshots, replication, and cyber-recovery backups, recognizing storage as the backbone of resilience</li>



<li>Vendor access restrictions and secure remote management</li>
</ul>



<p>These controls map directly to real-world attack techniques observed in recent storage and backup breaches &amp; ransomware incidents.</p>



<p class="has-medium-font-size"><strong>How StorageGuard helps you comply with ISO/IEC 27040</strong></p>



<p><strong><em>Required by ISO, Provided by StorageGuard</em></strong></p>



<p><a href="https://www.continuitysoftware.com/storageguard/" target="_blank" rel="noreferrer noopener">StorageGuard</a> is the only Security Posture Management solution purpose-built for enterprise storage and backup systems.</p>



<ul class="wp-block-list">
<li>Ensure adequate storage &amp; backup protection expertise</li>



<li>Ensure adequate storage &amp; backup security expertise</li>



<li>Perform storage &amp; backup system hardening</li>



<li>Apply vendor-recommend security configurations for all storage &amp; backup systems</li>



<li>Include storage &amp; backup in vulnerability management programs</li>
</ul>



<p class="has-medium-font-size"><strong>ISO 27040 Is a Baseline – Not the Finish Line</strong></p>



<p>One of the most important messages in ISO 27040 is that documentation alone is not enough. The standard repeatedly emphasizes validation, testing, and continuous assessment.</p>



<p>This is especially critical for storage and backup environments, where traditional vulnerability scanners often lack deep coverage, misconfigurations can persist unnoticed for years, and security posture can change overnight due to upgrades or operational changes.</p>



<p>Organizations that treat ISO 27040 as a one-time compliance exercise will miss its real value. Those that operationalize it by continuously assessing, hardening, and monitoring storage &amp; backup security will significantly improve their cyber resilience.</p>



<p class="has-medium-font-size"><strong>Final Thoughts</strong></p>



<p>Storage and backup systems are no longer passive infrastructure components. They are strategic security assets – and, if neglected, strategic liabilities.</p>



<p>ISO/IEC 27040:2024 provides a long-overdue, authoritative blueprint for protecting the systems that ultimately determine whether an organization can recover from a cyberattack.</p>



<p>If your storage &amp; backup systems are not secure, your security program is not complete.</p>



<p></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p class="has-small-font-size"><strong>Tech controls required by ISO, audited (and potentially enforced) by StorageGuard</strong></p>



<figure class="wp-block-table has-small-font-size"><table class="has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background has-fixed-layout"><tbody><tr><td><strong>Control </strong><strong></strong></td><td><strong>ID</strong></td></tr><tr><td>TC-BBFC-G01 Using FC LUN masking and mapping</td><td>10.9.1</td></tr><tr><td>TC-BBFC-G02 Using FCP for SCSI security measures</td><td>10.9.1</td></tr><tr><td>TC-BBFC-G03 Using data at rest encryption for FC storage</td><td>10.9.1</td></tr><tr><td>TC-CNFD-G11 Providing end-to-end security protections for data in motion</td><td>10.5.4.1</td></tr><tr><td>TC-CNFD-G15 Limiting plaintext exposure of plaintext keys</td><td>10.5.5</td></tr><tr><td>TC-CNFD-G16 Using centralized key management infrastructure</td><td>10.5.5</td></tr><tr><td>TC-CNFD-R01 Use cryptography with at least 128 bits of security strength</td><td>10.5.3</td></tr><tr><td>TC-CNFD-R02 TLS minimum requirements</td><td>10.5.4.2</td></tr><tr><td>TC-CNFD-R03 IPsec minimum requirements</td><td>10.5.4.3</td></tr><tr><td>TC-DSGN-G01 Adhering to core security design principles</td><td>10.2.1</td></tr><tr><td>TC-FBNF-G01 Securing data on NFS servers</td><td>10.10.2</td></tr><tr><td>TC-FBNF-R01 Apply NFS access controls</td><td>10.10.2</td></tr><tr><td>TC-FBNF-R02 Restrict NFS client behaviours</td><td>10.10.2</td></tr><tr><td>TC-FBSM-G01 Securing data on SMB servers</td><td>10.10.3</td></tr><tr><td>TC-FBSM-R01 Minimum acceptable SMB protocol</td><td>10.10.3</td></tr><tr><td>TC-FBSM-R02 Apply SMB access controls</td><td>10.10.3</td></tr><tr><td>TC-FBSM-R03 Restrict SMB client behaviours</td><td>10.10.3</td></tr><tr><td>TC-FCSS-G01 Controlling FCP node access</td><td>10.8.2.2</td></tr><tr><td>TC-FCSS-G02 Using FC switch-based controls</td><td>10.8.2.2</td></tr><tr><td>TC-FCSS-G03 Configuring FC device to meet security requirements</td><td>10.8.2.2</td></tr><tr><td>TC-HARD-G03 Ensuring completeness of storage audit logging</td><td>10.3.2</td></tr><tr><td>TC-HARD-G04 Implementing appropriate monitoring of storage</td><td>10.3.2</td></tr><tr><td>TC-HARD-G05 Using log retention and protection for storage</td><td>10.3.2</td></tr><tr><td>TC-HARD-R01 Perform logging on storage</td><td>10.3.2</td></tr><tr><td>TC-IPSS-G01 Using iSCSI network access and protocols</td><td>10.8.2.3</td></tr><tr><td>TC-IPSS-G02 Using FCIP network access and protocols</td><td>10.8.2.3</td></tr><tr><td>TC-IPSS-G03 Using IPsec to secure FCIP</td><td>10.8.2.3</td></tr><tr><td>TC-MGMT-G01 Using centralized authentication solutions</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G02 Using multi-factor authentication</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G03 Disabling login to the root or admin account</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G04 Remotely logging all privilege escalation operations</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G06 Separating security and non-security roles</td><td>10.4.2.2</td></tr><tr><td>TC-MGMT-G07 Securing the network interfaces to management software/firmware</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R01 Minimum user authentication measures</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-R02 Secure the remote management</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R03 Restrict vendor remote management</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R04 Restrict dial-up access use</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R05 Secure IPMI</td><td>10.4.3</td></tr><tr><td>TC-NASP-G01 Using NFS network access and protocols</td><td>10.8.3.2</td></tr><tr><td>TC-NASP-G02 Using encryption to secure NFS</td><td>10.8.3.2</td></tr><tr><td>TC-NASP-G03 Using SMB network access and protocols</td><td>10.8.3.3</td></tr><tr><td>TC-OBSS-G01 Using transport security for object-based storage transactions</td><td>10.12</td></tr><tr><td>TC-OBSS-G02 Using data at rest encryption for object-based storage</td><td>10.12</td></tr><tr><td>TC-OBSS-G03 Enabling data immutability for object-based storage</td><td>10.12</td></tr><tr><td>TC-PROT-G02 Using data backup measures and operations securely</td><td>10.14.2</td></tr><tr><td>TC-PROT-G03 Using cyber-attack recovery backups</td><td>10.14.2</td></tr><tr><td>TC-PROT-G04 Using data replication measures and operations securely</td><td>10.14.3</td></tr><tr><td>TC-PROT-G05 Using snapshots in conjunction with backups</td><td>10.14.4</td></tr><tr><td>TC-PROT-G06 Using snapshot security</td><td>10.14.4<br></td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p class="has-medium-font-size"><strong>Frequently Asked Questions (FAQs)</strong></p>



<h3 class="wp-block-heading has-small-font-size"><strong>Why is ISO/IEC 27040 important for cybersecurity?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 is important because storage and backup systems are increasingly targeted by ransomware and data-destructive attacks. The standard addresses long-standing security gaps by defining controls for encryption, access management, logging, protocol hardening, and data immutability—areas often overlooked by traditional security programs.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>How does ISO/IEC 27040 relate to ISO 27001 and ISO 27002?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 complements ISO 27001 and ISO 27002 by providing storage-specific security guidance that those standards do not cover in detail. While ISO 27001 defines information security management requirements and ISO 27002 lists general controls, ISO 27040 explains how to apply security controls specifically to storage, backup, and data protection technologies.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>What are the main security controls required by ISO/IEC 27040?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 defines controls across encryption, authentication, access control, logging, monitoring, protocol security, vendor access management, and secure data sanitization of storage and backup systems. Many requirements focus on eliminating insecure legacy protocols, enforcing minimum cryptographic strength, and continuously validating storage and backup security configurations.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>How does ISO/IEC 27040 impact audits and compliance?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 is increasingly used by auditors to assess whether organizations adequately protect storage and backup systems. While not a certification standard itself, it provides detailed criteria that auditors may use to evaluate compliance with ISO 27001, regulatory requirements, and cyber resilience expectations.</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/what-security-leaders-need-to-know-about-iso-27040-storage-backup-security/">What Security Leaders Need to Know About ISO27040 – Storage &amp; Backup Security</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lessons from Enterprise Storage Leaders &#8211; 2026 Trends, Threats &#038; Transformations</title>
		<link>https://www.continuitysoftware.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Mon, 05 Jan 2026 12:08:03 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/blog/the-war-on-enterprise-backups-and-how-to-fight-back-2/</guid>

					<description><![CDATA[<p>Storage used to be about capacity and performance, but today it’s about resilience, security, and intelligence – a shift that became clear during a recent Storage</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations/">Lessons from Enterprise Storage Leaders &#8211; 2026 Trends, Threats &amp; Transformations</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Storage used to be about capacity and performance, but today it’s about resilience, security, and intelligence – a shift that became clear during a recent <a href="https://www.continuitysoftware.com/resources/storage-leaders-virtual-panel-2026-trends-threats-transformations/"><strong>Storage Leaders Virtual Panel</strong></a> with enterprise storage leaders.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="256" src="https://www.continuitysoftware.com/wp-content/uploads/2026/01/Banner-12-1024x256.png" alt="" class="wp-image-13469" srcset="https://www.continuitysoftware.com/wp-content/uploads/2026/01/Banner-12-1024x256.png 1024w, https://www.continuitysoftware.com/wp-content/uploads/2026/01/Banner-12-300x75.png 300w, https://www.continuitysoftware.com/wp-content/uploads/2026/01/Banner-12-150x38.png 150w, https://www.continuitysoftware.com/wp-content/uploads/2026/01/Banner-12-768x192.png 768w, https://www.continuitysoftware.com/wp-content/uploads/2026/01/Banner-12-1536x384.png 1536w, https://www.continuitysoftware.com/wp-content/uploads/2026/01/Banner-12-2048x512.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p class="has-cyan-bluish-gray-background-color has-background has-medium-font-size"><strong>1. Industry Trends</strong></p>



<p class="has-medium-font-size"><strong>What do you see as the single biggest disruptor in enterprise storage &amp; backup today?</strong></p>



<p></p>



<p>For <strong>David Brown, Storage Architect at State of Michigan</strong>, the biggest disruptor is unambiguous:</p>



<p class="has-text-align-center"><em>“If you’d asked me this question 20 years ago, I would have said virtualization.<br>Today, the elephant in the room is artificial intelligence.”</em></p>



<p><strong>David</strong> contrasted the early days of SAN:</p>



<p class="has-text-align-center"><em>“One of the first SANs I ever put in was a whopping 5.5 terabytes. We thought, we’ll never outgrow this. Virtualization came along and we were doubling and tripling capacity almost every year.”</em></p>



<p>Now, AI and machine learning are driving a similar – but even more intense – disruption:</p>



<ul class="wp-block-list">
<li>New workloads (e.g., autonomous vehicles) are discussing yottabytes in capacity planning.</li>



<li>AI requires instant performance, low latency, and massive parallelism.</li>



<li>Storage becomes a core dependency for AI’s success, not just a downstream consumer.</li>
</ul>



<p class="has-cyan-bluish-gray-background-color has-background has-medium-font-size"><strong>2. Security</strong></p>



<p class="has-medium-font-size"><strong>How are storage systems adapting to the rise in ransomware attacks?</strong></p>



<p></p>



<p><strong>Julian Topley, Senior Delivery Manager – Storage &amp; Backup at Lloyds Banking Group</strong>, framed the shift starkly:</p>



<p class="has-text-align-center"><em>“We’ve invested for years in perimeter security. But the real vulnerability is the destination – the data. That’s where ransomware now goes, and increasingly backups as well.”</em></p>



<p><strong>Julian</strong> outlined two guiding principles:</p>



<ol start="1" class="wp-block-list">
<li><strong>Protection must be layered</strong></li>
</ol>



<p class="has-text-align-center"><em>“Snapshots and replication are the frontline for fast recovery. Backup and vaulting are the last bastion for recovery and forensics.”</em></p>



<ol start="2" class="wp-block-list">
<li><strong>Storage must get “cyber-smart”</strong></li>
</ol>



<p class="has-text-align-center"><em>“Storage has to offer immutability, anomaly detection, and clean recovery points.<br>Storage needs to be smart.”</em></p>



<p></p>



<p class="has-medium-font-size"><strong>Are immutability and air-gapped backups becoming table stakes?</strong></p>



<p></p>



<p><strong>David Brown’s</strong> answer was unequivocal:</p>



<p class="has-text-align-center"><em>“Both immutable backups and air-gapped backups have become table stakes for a true cyber-resilient strategy. They used to be advanced features. Today they’re mandatory requirements.”</em></p>



<p>He explained why traditional backup rules are no longer enough:</p>



<p class="has-text-align-center"><em>“The old 3-2-1 rule – three copies, two media, one offsite – isn’t enough. Attackers can still corrupt those locations.”</em></p>



<p>His team is moving toward an enhanced rule:</p>



<p class="has-text-align-center"><em>“We’re looking at a 3-2-1-1-0 rule: three copies of data, two different media types, one copy stored offline, one copy immutable or vaulted, and zero errors after verification when you restore.”</em></p>



<p>On cloud and air gapping:</p>



<p class="has-text-align-center"><em>“In my opinion, cloud-written backups do not constitute an air gap.<br>There’s still access to the cloud, and as we’ve seen, the cloud is not a guaranteed safe harbor.”</em></p>



<p></p>



<p class="has-medium-font-size"><strong>What challenges do you foresee with evolving data sovereignty laws?</strong></p>



<p></p>



<p><strong>Naresh Kattel, VP Storage Management from AllianceBernstein</strong> pointed out that global enterprises face a patchwork of regulations:</p>



<p class="has-text-align-center"><em>“Every large enterprise operates in different markets, and every market has a regulator.<br>These regulators are unleashed on you to make sure you understand the rules.”</em></p>



<p>He outlined three practical needs: know your inventory, understand regulatory impact, and partner with legal &amp; compliance.</p>



<p></p>



<p class="has-medium-font-size"><strong>Should InfoSec teams build deeper storage-security expertise?</strong></p>



<p></p>



<p><strong>Kevin Battle</strong> strongly believes in deeper cross-team understanding:</p>



<p class="has-text-align-center"><em>“Absolutely. Right now everything is segmented – separate security teams, separate backup teams, separate storage teams. But with new AI-aware software, everyone has to coordinate and be aware.”</em></p>



<p>He highlighted the role of storage-security tooling:</p>



<p class="has-text-align-center"><em>“That’s what I appreciate about solutions like <a href="http://www.continuitysoftware.com/">StorageGuard</a>, which I’ve used for three years. It gets inside the perimeter to scan storage and SAN. Those are areas other tools just don’t touch.”</em></p>



<p><strong>Julian Topley</strong> agreed on shared responsibility – but warned against blurring it:</p>



<p class="has-text-align-center"><em>“The security and storage teams must share the problem, but the key is not to blur responsibility.”</em></p>



<p>He framed it in the following way:</p>



<ul class="wp-block-list">
<li><strong>Security team</strong>: owns <em>threat, policy, escalation</em></li>



<li><strong>Storage &amp; backup team</strong>: own <em>configuration, change, fabrics, protocols</em></li>
</ul>



<p>Julian explains how 3<sup>rd</sup> party solutions can help:</p>



<p class="has-text-align-center"><em>“Tools like StorageGuard really help here – they continuously discover storage and backup systems and add that contextual security layer, mapping configurations and firmware against live vulnerabilities and good practice.”</em></p>



<p class="has-cyan-bluish-gray-background-color has-background has-medium-font-size"><strong>3. Technology &amp; Innovation</strong></p>



<p class="has-medium-font-size"><strong>How is AI changing storage management – is it hype or reality?</strong></p>



<p><strong>David Brown</strong> was clear:</p>



<p class="has-text-align-center"><em>“It’s definitely reality. We’re using AI for IT operations – supporting customer support, security, backup and recovery. For storage, it turns systems into active participants in maintaining uptime and data security.”</em></p>



<p>Examples he gave included:</p>



<ul class="wp-block-list">
<li><strong>Predictive maintenance</strong></li>
</ul>



<p class="has-text-align-center"><em>“Models continuously analyze logs, sensor readings, and performance to predict failures before they impact production.”</em></p>



<ul class="wp-block-list">
<li><strong>Intelligent tiering &amp; triage</strong></li>
</ul>



<p class="has-text-align-center"><em>“We used to write scripts to move data between tiers based on age and activity.<br>AI can now constantly analyze data and predict when it might be needed, staging it preemptively.”</em></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p class="has-medium-font-size"><strong><a href="https://www.continuitysoftware.com/resources/the-storage-leaders-guide-2026-trends-threats-transformations-2/">Click here</a> to read the full report: &#8216;The Storage Leaders Guide&#8217;, and watch the on-demand Virtual Panel, <a href="https://www.continuitysoftware.com/resources/storage-leaders-virtual-panel-2026-trends-threats-transformations/">click here</a>.</strong></p>



<p></p>
<p>The post <a href="https://www.continuitysoftware.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations/">Lessons from Enterprise Storage Leaders &#8211; 2026 Trends, Threats &amp; Transformations</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Has Changed the Rules of Cyber Defense. Here’s How to Respond</title>
		<link>https://www.continuitysoftware.com/blog/ai-has-changed-the-rules-of-cyber-defense-heres-how-to-respond/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 10:57:16 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/blog/the-war-on-enterprise-backups-and-how-to-fight-back-2/</guid>

					<description><![CDATA[<p>AI is transforming how organizations operate – but it’s also redefining the threat landscape. The same technologies that boost productivity and accelerate innovation are being weaponized</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/ai-has-changed-the-rules-of-cyber-defense-heres-how-to-respond/">AI Has Changed the Rules of Cyber Defense. Here’s How to Respond</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>AI is transforming how organizations operate – but it’s also redefining the threat landscape. The same technologies that boost productivity and accelerate innovation are being weaponized by attackers who can now discover, analyze, and exploit weaknesses with unprecedented speed and precision.</p>



<p>Threat actors no longer rely on slow, manual reconnaissance. With AI, they can instantly map environments, detect misconfigurations, craft targeted exploits, and orchestrate attacks at a scale and velocity that traditional defenses simply weren’t designed to withstand.</p>



<p>Because of this shift, organizations can no longer depend on periodic assessments or occasional audits. The pace of AI-driven threats demands continuous security posture management. Weaknesses must be identified faster, prioritized intelligently, and remediated sooner.</p>



<p>Put simply: <strong>you need to find more issues – and you need to fix them faster</strong><em>.</em></p>



<p class="has-medium-font-size"><strong>Data Infrastructure: A High-Value Target</strong></p>



<p>At the heart of every organization lies its data infrastructure: storage and backup platforms that house critical workloads, sensitive information, and the core of cyber-recovery operations.</p>



<p>These systems have always been attractive targets – but AI has dramatically raised the stakes. With access to powerful automated analysis tools, attackers can probe storage and backup environments, pinpoint subtle misconfigurations, and exploit vulnerabilities that once took days or weeks to uncover.</p>



<p>A compromised storage or backup environment can bring an entire organization to its knees.</p>



<p><a href="http://www.continuitysoftware.com/">StorageGuard</a> was built to stop this from happening. It continuously ensures that storage and backup systems are:</p>



<ul class="wp-block-list">
<li>Hardened according to security best practices</li>



<li>Compliant with industry and vendor guidelines</li>



<li>Free from known vulnerabilities</li>



<li>Aligned with the organization’s secure configuration baseline</li>
</ul>



<p>This continuous posture management – combined with deep domain expertise in storage and backup – helps organizations get ahead of rapidly evolving threats.</p>



<p class="has-medium-font-size"><strong>Two Critical Capabilities for Combatting AI-Driven Attacks</strong></p>



<p>To help customers keep pace with the sophistication and velocity of modern threats, we are expanding StorageGuard with two major capabilities:</p>



<p><strong>1. Automatic Remediation</strong></p>



<p>StorageGuard’s <strong>Fix It</strong> capability allows teams to initiate remediation directly from detected findings. When combined with our REST API, ITSM workflows, and AI integrations, organizations can enable fully automated remediation—ensuring misconfigurations are corrected continuously and consistently.</p>



<p>The result:</p>



<ul class="wp-block-list">
<li>A dramatically reduced exposure window</li>



<li>Fewer manual processes</li>



<li>Scalable security and operations without increasing headcount</li>
</ul>



<p><strong>2. AI Integration for Natural-Language Security Operations</strong></p>



<p>By connecting your AI environment to the <strong>StorageGuard MCP Server*</strong>, teams can inspect and harden configurations, investigate and resolve weaknesses, and validate compliance—all through natural language.</p>



<p>Imagine prompting your AI assistant to:</p>



<ul class="wp-block-list">
<li><em>“Remediate incorrect ACL settings on my backup appliances.”</em></li>



<li><em>“Check whether my backup system is vulnerable to CVE-2025-57788 and create a mitigation plan.”</em></li>
</ul>



<p>This removes the learning curve for complex infrastructure, accelerates investigations, and simplifies audit and compliance workflows.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="425" height="713" src="https://www.continuitysoftware.com/wp-content/uploads/2025/12/AI-pic-1-3.png" alt="" class="wp-image-13457" srcset="https://www.continuitysoftware.com/wp-content/uploads/2025/12/AI-pic-1-3.png 425w, https://www.continuitysoftware.com/wp-content/uploads/2025/12/AI-pic-1-3-179x300.png 179w, https://www.continuitysoftware.com/wp-content/uploads/2025/12/AI-pic-1-3-89x150.png 89w" sizes="(max-width: 425px) 100vw, 425px" /></figure>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><a href="https://www.youtube.com/watch?v=2cERfSGApr0"><img decoding="async" width="1024" height="256" data-id="13444" src="https://www.continuitysoftware.com/wp-content/uploads/2025/12/Banner-10-1024x256.png" alt="" class="wp-image-13444" srcset="https://www.continuitysoftware.com/wp-content/uploads/2025/12/Banner-10-1024x256.png 1024w, https://www.continuitysoftware.com/wp-content/uploads/2025/12/Banner-10-300x75.png 300w, https://www.continuitysoftware.com/wp-content/uploads/2025/12/Banner-10-150x38.png 150w, https://www.continuitysoftware.com/wp-content/uploads/2025/12/Banner-10-768x192.png 768w, https://www.continuitysoftware.com/wp-content/uploads/2025/12/Banner-10-1536x384.png 1536w, https://www.continuitysoftware.com/wp-content/uploads/2025/12/Banner-10-2048x512.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>
</figure>



<p></p>



<p class="has-medium-font-size"><strong>The Bottom Line</strong></p>



<p>AI is accelerating both sides of cybersecurity. Attackers are moving faster &#8211; and defenders must, too.</p>



<p>Continuous posture management, automated remediation, and natural-language-driven security operations are no longer optional. They’re becoming essential.</p>



<p>StorageGuard ensures that your most critical data systems remain secure, compliant, and resilient – even as threats evolve at machine speed.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p class="has-small-font-size">*The StorageGuard MCP Server is included in the Enterprise + AI edition of StorageGuard and is currently available under limited release.</p>



<p></p>
<p>The post <a href="https://www.continuitysoftware.com/blog/ai-has-changed-the-rules-of-cyber-defense-heres-how-to-respond/">AI Has Changed the Rules of Cyber Defense. Here’s How to Respond</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Escalating War on Enterprise Backups — and How to Fight Back</title>
		<link>https://www.continuitysoftware.com/blog/the-war-on-enterprise-backups-and-how-to-fight-back/</link>
		
		<dc:creator><![CDATA[Gil Hecht]]></dc:creator>
		<pubDate>Wed, 05 Nov 2025 14:34:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience-2/</guid>

					<description><![CDATA[<p>According to recent research by Trend Micro, the ‘Agenda’ ransomware group (aka “Qilin”) has evolved its attack chain to focus on the “last-mile” of enterprise systems</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/the-war-on-enterprise-backups-and-how-to-fight-back/">The Escalating War on Enterprise Backups — and How to Fight Back</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>According to recent <a href="https://industrialcyber.co/ransomware/agenda-ransomware-abusing-remote-access-backup-tools-to-escalate-attacks-on-critical-infrastructure-in-2025/">research by Trend Micro</a>, the ‘Agenda’ ransomware group (aka “Qilin”) has evolved its attack chain to focus on the “last-mile” of enterprise systems — namely backup infrastructures. They specifically target backup systems to harvest credentials, disable recovery options, and thereby magnify impact on critical infrastructure.</p>



<p>Since January 2025, the ransomware group has affected 591 organizations across 58 countries. Most victims were in the US, Canada, and UK – with financial services, healthcare, and manufacturing among the hardest hit.</p>



<p>According to the research, any environment using centralized backup solutions or hybrid Windows/Linux infrastructures is at risk.</p>



<p class="has-medium-font-size"><strong>Industry Report Reveals Widespread Risk&nbsp;</strong></p>



<p>While this may sound like a shocking statistic, this doesn’t come as a surprise. In Continuity’s annual primary research,&nbsp;<a href="https://www.continuitysoftware.com/resources/the-2025-security-maturity-of-storage-data-protection-systems/" target="_blank" rel="noreferrer noopener"><em>The 2025 Security Maturity of Storage &amp; Data Protection Systems</em></a>, which assessed 323 enterprise environments encompassing 11,435 backup and storage systems, the findings were alarming:</p>



<p class="has-medium-font-size"><strong>Key Findings:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>6,085 distinct security issues uncovered – spanning over 390 failed security principles </li>



<li>On average, each backup and storage system contained 10 security risks, 5 of which were classified as high or critical </li>



<li>The most common risk areas included:
<ul class="wp-block-list">
<li>Authentication &amp; identity management </li>



<li>Access control &amp; authorization gaps </li>



<li>Unaddressed CVEs </li>



<li>Improper use of ransomware protection features </li>



<li>Encryption misconfigurations</li>
</ul>
</li>
</ul>



<p>This data reinforces the growing reality that most backup and storage environments remain significantly under-secured – despite mounting threats.&nbsp;</p>



<p class="has-medium-font-size"><strong>The Trend: Targeting Backup as a Primary Attack Vector&nbsp;</strong></p>



<p>Attackers are zeroing in on backup systems as prime targets. Why? Because these systems are the last line of defense – and compromising them disables recovery, facilitates ransomware extortion, and opens pathways to broader lateral movement.&nbsp;</p>



<p>One high-profile example: the largest data breach in history at <a href="https://www.darkreading.com/cyberattacks-data-breaches/unitedhealth-congressional-testimony-rampant-security-fails">UnitedHealth</a>, where attackers successfully disabled their backup environment, preventing data recovery and causing months-long operational disruption.&nbsp;</p>



<p class="has-medium-font-size"><strong>Why Backup Systems Are High-Value Targets&nbsp;</strong></p>



<p>Backup systems are foundational to enterprise data resilience. By compromising them, attackers can:&nbsp;</p>



<ul class="wp-block-list">
<li>Neutralize recovery capabilities (especially in ransomware attacks) </li>



<li>Exfiltrate sensitive data </li>



<li>Destroy or corrupt primary data or backup data copies </li>



<li>Use these platforms as stealthy pivot points to compromise broader IT environments </li>
</ul>



<p>Despite their criticality, these systems are often under-secured. Many security teams lack visibility, tooling, or expertise to adequately defend them.&nbsp;</p>



<p class="has-medium-font-size"><strong>Conclusion: The Back-End is Now The Front-Line&nbsp;</strong></p>



<p>The recent wave of attacks is a stark reminder: backup systems are not just infrastructure – they’re high-value assets under direct attack. It’s time they receive the same security scrutiny and operational rigor as front-line systems.</p>



<p>Tools like&nbsp;<a href="https://www.continuitysoftware.com/storageguard/" target="_blank" rel="noreferrer noopener">StorageGuard</a>&nbsp;are critical in bridging this gap and defending one of the most vulnerable layers of the modern enterprise.&nbsp;</p>



<p>StorageGuard&nbsp;is the only&nbsp;Security Posture Management solution&nbsp;purpose-built for enterprise backup, storage, and data protection systems.</p>



<p>It scans, detects, and prioritizes vulnerabilities, security misconfigurations, and compliance gaps across multi-vendor backup and storage systems, enabling organizations to proactively secure their critical data infrastructure.</p>



<p>By bridging the security visibility gap in backup and storage layers, StorageGuard&nbsp;empowers IT and security teams to identify and remediate risks before they impact data availability, integrity, or confidentiality – strengthening an often-overlooked but vital part of the enterprise attack surface.</p>



<p></p>
<p>The post <a href="https://www.continuitysoftware.com/blog/the-war-on-enterprise-backups-and-how-to-fight-back/">The Escalating War on Enterprise Backups — and How to Fight Back</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Five Levels of Configuration Baselines: A Roadmap to Hardening Your Storage &#038; Backup Systems</title>
		<link>https://www.continuitysoftware.com/blog/five-levels-of-configuration-baselines-roadmap-to-hardening-storage-backups/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Thu, 30 Oct 2025 10:21:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience-2/</guid>

					<description><![CDATA[<p>In today’s complex enterprise environments, maintaining consistent and secure configurations across heterogeneous systems is no easy feat. From storage arrays and backup software to cloud repositories</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/five-levels-of-configuration-baselines-roadmap-to-hardening-storage-backups/">Five Levels of Configuration Baselines: A Roadmap to Hardening Your Storage &amp; Backup Systems</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today’s complex enterprise environments, maintaining consistent and secure configurations across heterogeneous systems is no easy feat. From storage arrays and backup software to cloud repositories and SAN fabrics, every system must adhere to well-defined configuration standards to ensure resilience, compliance, and cyber readiness.</p>



<p>That’s where configuration baselines come in.</p>



<p class="has-medium-font-size"><strong>Why Configuration Baselines Matter</strong></p>



<p>A configuration baseline defines the expected settings and controls that every system should follow. Much like a checklist for secure and reliable operations, baselines ensure that all systems are configured according to best practices and organizational requirements.</p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="682" data-id="13388" src="https://www.continuitysoftware.com/wp-content/uploads/2025/10/Why-config-baselines-1024x682.png" alt="" class="wp-image-13388" srcset="https://www.continuitysoftware.com/wp-content/uploads/2025/10/Why-config-baselines-1024x682.png 1024w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Why-config-baselines-300x200.png 300w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Why-config-baselines-150x100.png 150w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Why-config-baselines-768x512.png 768w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Why-config-baselines-1536x1023.png 1536w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Why-config-baselines-2048x1365.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
</figure>



<p>When properly implemented, configuration baselines:</p>



<ul class="wp-block-list">
<li>Help maintain hardened, healthy, and resilient systems</li>



<li>Enable compliance with internal and external standards</li>



<li>Simplify audit preparation and risk management</li>



<li>Provide a foundation for continuous security improvement</li>
</ul>



<p>For example, a simple but crucial baseline requirement is to configure Network Time Protocol (NTP) for accurate time synchronization across systems – essential for logging, auditing, and correlation.</p>



<p class="has-medium-font-size"><strong>The Anatomy of a Baseline Requirement</strong></p>



<p>Each baseline requirement should be clearly documented and traceable. A well-structured baseline entry typically includes:</p>



<ul class="wp-block-list">
<li><strong>Summary</strong> – A short description of the control (e.g., “Disable Telnet access”)</li>



<li><strong>Rationale</strong> – Why this control is needed and what risk it mitigates</li>



<li><strong>Product-specific details</strong> – Relevant models, versions, and implementation notes</li>



<li><strong>Lifecycle data</strong> – Creation, review, and update dates</li>



<li><strong>References</strong> – Vendor or regulatory sources</li>
</ul>



<p>This approach allows teams to build, verify, and maintain baselines in a repeatable and scalable way.</p>



<p class="has-medium-font-size"><strong>The Tiered Baseline Approach: Gradual, Measurable Improvement</strong></p>



<p>Not all systems are equally sensitive — and not every organization can jump straight to “perfect” hardening. That’s why tiered, progressive baselines provide a practical path for continuous improvement.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="305" src="https://www.continuitysoftware.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-1024x305.png" alt="" class="wp-image-13387" srcset="https://www.continuitysoftware.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-1024x305.png 1024w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-300x89.png 300w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-150x45.png 150w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-768x229.png 768w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-1536x458.png 1536w, https://www.continuitysoftware.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-2048x611.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Each tier represents a progressive level of configuration maturity:</p>



<p><strong>Level 1: Essentials</strong></p>



<p>Focus on foundational controls like:</p>



<ul class="wp-block-list">
<li>Disabling Telnet and insecure protocols</li>



<li>Enforcing password policies</li>



<li>Enabling multifactor authentication</li>



<li>Setting role-based access controls (RBAC)</li>



<li>Denying default Fibre Channel zones</li>
</ul>



<p><strong>Level 2: Enhanced</strong></p>



<p>Build on essentials by adding:</p>



<ul class="wp-block-list">
<li>IP Access Control Lists (ACLs)</li>



<li>Remote support and email alert configurations</li>



<li>NTP and system time settings</li>



<li>Encrypted data-at-rest where applicable</li>
</ul>



<p><strong>Level 3: Advanced</strong></p>



<p>Strengthen your security posture with:</p>



<ul class="wp-block-list">
<li>Valid certificate enforcement</li>



<li>Secure SNMPv3 configurations</li>



<li>Syslog integration and strong cipher suites</li>



<li>Dual authorization for destructive operations</li>



<li>Encryption for backup traffic</li>
</ul>



<p><strong>Level 4: Robust</strong></p>



<p>Push towards resilience with:</p>



<ul class="wp-block-list">
<li>No root login</li>



<li>Internal firewall enforcement</li>



<li>SMB signing and NFSv4 + Kerberos</li>



<li>Anomaly detection and authorized server lists</li>



<li>Segregated management and data networks</li>
</ul>



<p><strong>Level 5: Fortified</strong></p>



<p>Achieve full hardening and audit readiness with:</p>



<ul class="wp-block-list">
<li>External key management</li>



<li>FIPS mode enforcement</li>



<li>Secure syslog and time synchronization</li>



<li>Smart card (PIV/CAC) authentication</li>



<li>Cloud/SaaS connection restrictions</li>
</ul>



<p>This tiered methodology allows enterprises to customize their journey – defining their starting point and target maturity by system criticality and sensitivity.</p>



<p class="has-medium-font-size"><strong>Common Enemies of Configuration Baselines</strong></p>



<p>Despite best intentions, many organizations struggle to maintain consistent baselines due to:</p>



<ul class="wp-block-list">
<li><strong>Heterogeneous environments</strong> spanning multiple vendors and products</li>



<li><strong>Frequent provisioning/decommissioning</strong> cycles</li>



<li><strong>Mergers &amp; acquisitions</strong>, introducing configuration drift</li>



<li><strong>Manual verification processes</strong> that can’t scale</li>



<li><strong>API/CLI changes</strong> introduced by vendors</li>



<li><strong>Outdated baselines</strong> not reflecting new threats or compliance updates</li>
</ul>



<p>To combat these, periodic reviews and automation are non-negotiable.</p>



<p class="has-medium-font-size"><strong>Keeping Baselines Current: Continuous Verification</strong></p>



<p>A baseline is only as strong as its maintenance process. Organizations must routinely assess whether:</p>



<ul class="wp-block-list">
<li>New features or CLI/API changes affect baseline implementation</li>



<li>Updated vendor best practices or security advisories exist</li>



<li>New audit or compliance requirements have emerged</li>



<li>Internal policies have evolved</li>
</ul>



<p>This requires continuous research, verification and configuration drift detection, ideally through automated tools.</p>



<p class="has-medium-font-size"><strong>How StorageGuard Helps</strong></p>



<p><a href="https://www.continuitysoftware.com/storageguard/">StorageGuard</a> simplifies baseline management for enterprise storage and backup systems by providing:</p>



<ul class="wp-block-list">
<li>A <strong>built-in risk library</strong> of best practice configuration checks</li>



<li><strong>Automated scans</strong> (scheduled or on-demand) for drift detection</li>



<li><strong>Secure configuration and hardening guidelines</strong> mapped to NIST, CIS, ISO, PCI DSS, HIPAA, and STIG standards, etc.</li>



<li><strong>Integration</strong> with ITSM, SIEM, and dashboarding tools</li>



<li><strong>Single control plane</strong> for heterogeneous storage and backup environments (Dell, NetApp, Hitachi Vantara, HPE, Pure, IBM, Rubrik, Commvault, Cohesity, Veeam, Veritas, etc.)</li>
</ul>



<p>With StorageGuard, teams can configure, verify, and enforce baselines across all storage and backup assets — reducing the attack surface and strengthening overall cyber resilience.</p>



<p class="has-medium-font-size"><strong>Key Takeaways</strong></p>



<ul class="wp-block-list">
<li>Use tiered baselines for a practical, progressive hardening approach</li>



<li>Keep your baselines current and aligned with cyber threats, vendor and compliance guidelines</li>



<li>Automate detection and remediation of deviations</li>



<li>Embrace continuous verification to maintain confidence in your security posture</li>
</ul>



<p>Automation is key – because in complex enterprise storage and backup environments, manual compliance is no longer sustainable.</p>



<p><strong>Ready to start building your baseline?</strong><br><a href="https://www.continuitysoftware.com/talk-to-an-expert/">Learn more</a> about how StorageGuard can help you strengthen your storage and backup environments.</p>



<p class="has-small-font-size"></p>
<p>The post <a href="https://www.continuitysoftware.com/blog/five-levels-of-configuration-baselines-roadmap-to-hardening-storage-backups/">Five Levels of Configuration Baselines: A Roadmap to Hardening Your Storage &amp; Backup Systems</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Keep Your Cyber Vault and Backup Systems Hardened – From Day One and Beyond</title>
		<link>https://www.continuitysoftware.com/blog/how-to-keep-your-cyber-vault-and-backup-systems-hardened/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Wed, 22 Oct 2025 09:28:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience-2/</guid>

					<description><![CDATA[<p>Ransomware isn’t slowing down – and for many organizations, the cyber vault has become the last line of defense. But here’s the catch: vaulted storage and</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/how-to-keep-your-cyber-vault-and-backup-systems-hardened/">How to Keep Your Cyber Vault and Backup Systems Hardened – From Day One and Beyond</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Ransomware isn’t slowing down – and for many organizations, the cyber vault has become the last line of defense. But here’s the catch: vaulted storage and backup systems aren’t secure out of the box. They need to be properly hardened and <strong>kept that way</strong>, to make sure that when the time comes, your “last good copy” is actually good.</strong></p>



<p class="has-medium-font-size"><strong>Hardening From the Get-Go</strong></p>



<p>A hardened environment doesn’t happen automatically. You’ve got to start with a solid hardening guide for each of the vaulted platforms and implement hundreds of configurations, such as:</p>



<ul class="wp-block-list">
<li>Keep backup systems off the domain</li>



<li>Require multi-factor authentication (MFA)</li>



<li>Enforce dual control for sensitive actions</li>



<li>Apply access control lists (ACLs) and least privilege</li>



<li>Use dedicated user accounts for backup software and targets</li>



<li>Practice good secret management and session limits</li>



<li>Configure secure snapshots or immutable backup copies</li>



<li>Secure time synchronization</li>



<li>And many other hardening configurations</li>
</ul>



<p>It’s all about layering controls so no single mistake becomes a breach.</p>



<p class="has-medium-font-size"><strong>It Can Be Configured &#8211; It Just Isn’t</strong></p>



<p>Facts check &#8211; Manufacturers of vaulted storage &amp; backup solutions almost always:</p>



<ul class="wp-block-list">
<li>Publish hardening guides.</li>



<li>Expect customers to review, decide on, and implement dozens of additional settings per system—on top of standard configuration.</li>



<li>Place responsibility on the customer to configure the solution in accordance with the hardening guide.</li>



<li>Place responsibility on the customer to harden any integrated components inside the vault (e.g.,networking, backup, recovery, storage) according to security standards and best practices.</li>



<li>There are valid reasons for this—some security settings can affect operational efficiency or performance and add cost in dollars, time, and effort—and organizations differ in how much of that trade-off they’ll accept.</li>
</ul>



<p>I call this the “can be configured” syndrome—where vendors bury what’s possible across multiple documents and expect customers to find, interpret, and implement it themselves.</p>



<p class="has-medium-font-size"><strong>Vaults Often Cover A Subset &#8211; What About The Rest?</strong></p>



<p>Let’s face it: not every system gets a vaulted backup. In fact, most companies only vault a small subset of their most critical systems. That’s usually because vaulting comes with real costs and complexity.</p>



<p>So what about everything else? The storage and backup systems that <em>don’t</em> live inside a vault still matter, and they can still be compromised if not properly hardened. That’s why it’s important to apply the same level of rigor across your broader storage and backup environment, not just selected few.</p>



<p class="has-medium-font-size"><strong>Preventing Configuration Drift and Ensuring Continuous Compliance</strong></p>



<p>Even if you get the setup right, things drift. Systems change, patches get missed, new configurations sneak in and suddenly, the environment you hardened six months ago doesn’t look so tight anymore.</p>



<p>To stay ahead, you need to:</p>



<ul class="wp-block-list">
<li>Watch for configuration drift</li>



<li>Audit your security controls regularly</li>



<li>Find and prioritize security misconfigurations and vulnerabilities before attackers do</li>
</ul>



<p>Continuous visibility and validation are the only ways to make sure your system hardening actually holds up over time.</p>



<p class="has-medium-font-size"><strong>The Unvaulted Need Strong Cyber Hygiene</strong></p>



<p>Here’s where things get interesting. For systems without vaulted backups, strong security hygiene is everything. That means hardened configuration baselines, strict privileges, immutable backups, and dual authorization for any restore or delete actions, ACLs, IP filters, tight identify management, disabling unneeded services and many other hardening elements.</p>



<p>You might not have the same physical or network separation as a full cyber vault, but you can still create logical and procedural separation that delivers real protection.</p>



<p class="has-medium-font-size"><strong>StorageGuard: Hardening Made Simple</strong></p>



<p>This is where <a href="http://www.continuitysoftware.com/">StorageGuard</a> helps. Our solution delivers automated hardening and continuous posture management for all enterprise storage and backup environments – both vaulted and non-vaulted.</p>



<ul class="wp-block-list">
<li><strong>Quick deployment</strong> – software-only, agentless</li>



<li><strong>Simple setup</strong> – start identifying hardening opportunities immediately</li>



<li><strong>Actionable insights</strong> – instantly pinpoint security misconfigurations, vulnerabilities and compliance issues – along with remediation guidance</li>



<li><strong>Ongoing assurance</strong> – continuously monitor for config drift and enforce controls</li>
</ul>



<p><em><strong>With StorageGuard, enterprises can strengthen their cyber vaults and broader backup ecosystem quickly, efficiently, and at scale.</strong></em></p>



<p></p>
<p>The post <a href="https://www.continuitysoftware.com/blog/how-to-keep-your-cyber-vault-and-backup-systems-hardened/">How to Keep Your Cyber Vault and Backup Systems Hardened – From Day One and Beyond</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dell Technologies and Continuity Partner to Secure Global Insurance Firm’s Storage &#038; Backup Environment</title>
		<link>https://www.continuitysoftware.com/blog/dell-and-continuity-secure-insurance-firm-storage-backup-systems/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Sun, 28 Sep 2025 12:39:50 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/blog/customer-story-securing-national-banks-last-line-of-defense-2/</guid>

					<description><![CDATA[<p>Background – Identifying the Need for Security Control and Governance In 2024, one of the world’s largest insurance firms suffered a data breach, which led to</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/dell-and-continuity-secure-insurance-firm-storage-backup-systems/">Dell Technologies and Continuity Partner to Secure Global Insurance Firm’s Storage &amp; Backup Environment</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading has-text-color has-link-color wp-elements-2110274634139d6f469d9da1baec669c" style="color:#0f2076"><strong>Background – Identifying the Need for Security Control and Governance</strong></h3>



<p>In 2024, one of the world’s largest insurance firms suffered a data breach, which led to a rethink of their security strategy. With mounting pressure to ensure that critical infrastructure remained secure and compliant, the insurance firm needed a solution that could validate the configuration controls of these systems (including Dell Technologies, NetApp, and Brocade), and bridge the security visibility gap in their storage and data protection environment.</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-cc54b36e9eee3e42519995304b909d8f" style="color:#0f2076"><strong>Laying the Groundwork: Dell Technologies and Continuity in Sync</strong></h3>



<p>The firm’s IT Infrastructure department was actively managing the configuration for their servers, but not for their storage &amp; data protection systems.</p>



<p>While they had several processes for checking the configuration of their storage and data protection systems, they had no automated baselining mechanism in place, and no ability to scan the security configuration of these mission-critical systems.</p>



<p>The infrastructure team was concerned about the lack of a security baseline, and aligning their configurations to CIS Benchmarks.</p>



<p>Working with one of Dell’s <a href="https://www.dell.com/en-us/lp/dt/solutions-extended-technologies-complete" target="_blank" rel="noreferrer noopener">Extended Technologies Complete (ETC)</a> partners, Continuity – Dell offered <a href="http://www.core.com">StorageGuard</a>, a solution that could help the insurance firm gain complete visibility into the security posture of their storage and data protection systems. This includes:</p>



<ul class="wp-block-list">
<li>Detecting when industry and vendor security configuration best practices are not implemented</li>



<li>Validating adherence to various regulatory guidelines and industry standards, including CIS Benchmarks</li>



<li>Continuous hardening of all storage and data protection systems</li>
</ul>



<p>In September 2024, Dell and Continuity conducted a StorageGuard Proof of Concept (POC) for a subset of their PowerProtect DD (formerly Data Domain), PowerFlex, PowerScale (formerly Isilon), and Brocade SAN switches. This surfaced many security misconfigurations and vulnerabilities, along with remediation guidance.</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-3b9fab086c16f531c95c76ae1f522188" style="color:#0f2076"><strong>Joint Execution: From Insight to Action</strong></h3>



<p>Following the POC, the firm purchased StorageGuard licenses and Professional Services – with deployment taking place in under four months.</p>



<p>The firm set 4-month goals to do the following:</p>



<ul class="wp-block-list">
<li>Establish a comprehensive baseline within StorageGuard for monitoring vulnerabilities, configuration best practices, and drift across their storage and data protection systems.</li>



<li>Facilitate reporting against this baseline, prioritize the remediation of <strong>25%</strong> of identified security findings, and create a documented framework for data integration into their IT Service Management platform, to include security reporting systems.</li>
</ul>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-7652976293c5a5c7d8e2ed3ed76a566c" style="color:#0f2076"><strong>Results so far</strong></h3>



<ul class="wp-block-list">
<li><strong>Enhanced security visibility</strong> across outsourced storage and data protection environments.</li>



<li><strong>Rapid detection and remediation</strong> of high-risk security misconfigurations and vulnerabilities. The infrastructure team remediated 30% of baseline configuration risks and vulnerabilities, surpassing the 25% target. And they want to keep the momentum going with another 25% of risks remediated in the next 3 months.</li>



<li><strong>Streamlined procurement and rollout</strong>, managed entirely through Dell.</li>
</ul>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-138b689ed5880328f8e1491795a20d95" style="color:#0f2076"><strong>Future Plans</strong></h3>



<p>Due to the success of the project, the firm’s infrastructure team plan on expanding StorageGuard across their APAC businesses. The deadline for this deployment set by customer is Q1 2026.</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-79fcce6c01aa90eca773e54882f236e0" style="color:#0f2076"><strong>Why the Partnership Worked</strong></h3>



<p>The success of this engagement was rooted in how Dell and Continuity aligned their strengths:</p>



<ul class="wp-block-list">
<li>Continuity brought deep, purpose-built technology to uncover and mitigate risks in complex storage environments.</li>



<li>Dell provided trusted delivery, procurement flexibility, and managed services capabilities to seamlessly embed the solution within the firm’s operating framework.</li>
</ul>



<p><strong>This customer project exemplifies the power of a well-aligned partnership. By combining StorageGuard with Dell’s enterprise delivery model, the insurance firm was able to take decisive action on storage &amp; data protection risks – ensuring governance, visibility, and peace of mind across this mission-critical infrastructure.</strong></p>



<p></p>
<p>The post <a href="https://www.continuitysoftware.com/blog/dell-and-continuity-secure-insurance-firm-storage-backup-systems/">Dell Technologies and Continuity Partner to Secure Global Insurance Firm’s Storage &amp; Backup Environment</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beyond the Vault: Hardening Your Backups for Ultimate Cyber Resilience</title>
		<link>https://www.continuitysoftware.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 08:40:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/?p=13319</guid>

					<description><![CDATA[<p>Why Post-Deployment Hardening Matters Many enterprises have already taken the critical first step of deploying a cyber vault to protect backup copies. However, the harsh reality</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience/">Beyond the Vault: Hardening Your Backups for Ultimate Cyber Resilience</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Why Post-Deployment Hardening Matters</strong></p>



<p>Many enterprises have already taken the critical first step of deploying a cyber vault to protect backup copies. However, the harsh reality is that deployment alone doesn’t guarantee resilience. Attackers are adapting, and misconfigured vaults or backup systems are still vulnerable to compromise.</p>



<p>In fact, <a href="https://www.continuitysoftware.com/resources/the-2025-security-maturity-of-storage-data-protection-systems/?utm_source=mmdy">The Security Maturity of Storage &amp; Data Protection Systems report</a> shows that the average backup or storage device typically contains <strong>10 vulnerabilities</strong>, five of which are high or critical, with many organizations lacking visibility into these risks.</p>



<p>For organizations that have started their cyber vault journey—or have a vault in production—this is the point where the real work begins: hardening, continuous validation, and integrating the vault into your wider cyber-resilience strategy.</p>



<p><strong>Why Harden an Existing Vault &amp; Backup Environment?</strong></p>



<ul class="wp-block-list">
<li><strong>Vault Misconfiguration Risks:</strong> A misconfigured air-gap, weak admin controls, or unpatched management interface can render even the most sophisticated vault ineffective.</li>



<li><strong>Attackers Target Vaults Directly:</strong> Sophisticated ransomware groups now target vault appliances and metadata to wipe or corrupt clean copies.</li>



<li><strong>Compliance Pressure:</strong> Frameworks like NIST SP 800‑209 and ISO/IEC 27040 emphasize <em>ongoing validation and secure configuration management</em> for vaults and backup infrastructure—not just initial deployment.</li>



<li><strong>Recovery Readiness:</strong> Without continuous validation and hardening, you risk discovering configuration drift or corrupted data only during a crisis.</li>
</ul>



<p><strong>What is a Cyber Vault? (A Reminder For Those Who Are Currently Looking Into It)</strong></p>



<p>You’ve likely deployed one of these or are in the process of evaluating:</p>



<ul class="wp-block-list">
<li><strong>Dell PowerProtect Cyber Recovery Vault</strong> – Clean-room recovery workflows and malware scanning for validated restoration.</li>



<li><strong>Rubrik Vault</strong> – Zero-trust architecture with immutable backups and automated recovery validation.</li>



<li><strong>Cohesity FortKnox</strong> – SaaS-managed, WORM-protected backup snapshots with multi-role approval and anomaly detection.</li>



<li><strong>NetApp Cyber Vault</strong> – ONTAP-based, SnapMirror-driven isolated snapshot environment with layered access controls.</li>



<li><strong>HPE Cyber Vault</strong> – Immutable, air-gapped copies with automated validation and recovery orchestration.</li>



<li><strong>Commvault Cleanroom &amp; Cyber Vault</strong> – WORM-backed, anomaly-detected, isolated backups with automated “cleanroom” recovery.</li>



<li><strong>IBM Cyber Vault</strong> – FlashSystem/IBM Z-based immutable snapshots with orchestrated recovery testing and validation exercises.</li>



<li><strong>Veeam Cyber Vault</strong> – Azure-based immutable backup vault with enforced retention and zero-trust access.</li>
</ul>



<p><em>If you already have one of these in place, the question isn’t “Do I have a vault?”.</em></p>



<p><em>It’s <strong>“Is my vault hardened and continuously validated?”</strong></em></p>



<p><strong>How StorageGuard Helps After Deployment</strong></p>



<p>Unlike initial vault deployment projects, StorageGuard focuses on post-deployment hardening and ongoing cyber-resilience validation:</p>



<ul class="wp-block-list">
<li><strong>Continuous Vulnerability Scanning:</strong> Detects CVEs and misconfigurations inside the vault and backup infrastructure, including OS, hypervisors, management interfaces, and storage controllers.</li>



<li><strong>Configuration Baseline Enforcement:</strong> Compares your vault and backup settings to vendor hardening guides and compliance frameworks. Alerts on drift over time.</li>



<li><strong>Recovery-Readiness Checks:</strong> Automates validation that your vault copies are not only isolated but also recoverable and aligned with retention policies.</li>



<li><strong>Compliance Reporting:</strong> Generates audit-ready evidence for NIST, ISO, PCI, HIPAA, and CIS frameworks to demonstrate ongoing vault security.</li>



<li><strong>Multi-Vendor Validation:</strong> Works across Dell, HPE, NetApp, Rubrik, Commvault, IBM, and Cohesity vaults – ideal for enterprises with heterogeneous backup and storage environments.</li>
</ul>



<p><strong>Cyber Vault + StorageGuard: A Combined Strategy</strong></p>



<ul class="wp-block-list">
<li><strong>Cyber Vault =</strong> Immutable, isolated copies of critical data.</li>



<li><strong>StorageGuard =</strong> Continuous hardening, vulnerability management, and compliance enforcement for the vault – and the entire backup ecosystem.</li>
</ul>



<p>Deploying a vault is step one. Making it resilient, validated, and operationalized is step two – and it’s where most organizations fail without a dedicated hardening platform.</p>



<p><strong>Conclusion</strong></p>



<p>If you’ve already invested in a cyber vault, you’re on the right path. But the journey doesn’t end at deployment. To ensure your vault truly functions as the last line of defense against ransomware and insider threats, you need continuous hardening and validation.</p>



<p>With StorageGuard, you can move from <em>“we have a vault”</em> to <em>“our vault is secure, compliant, and always ready for recovery.”</em></p>



<p>_____________________________________________________</p>



<p><strong>Frequently Asked Questions (FAQ)</strong></p>



<p class="has-small-font-size"><strong>1. What is a cyber vault?</strong></p>



<p class="has-small-font-size">A cyber vault is a secure, isolated backup environment designed to store immutable copies of critical data. It creates a logical or physical air-gap between production systems and backup copies, protecting them from ransomware, insider threats, and accidental deletion. Cyber vaults are considered the last line of defense in modern cyber-resilience strategies.</p>



<p class="has-small-font-size"><strong>2. If I’ve already deployed a cyber vault, why do I still need to harden it?</strong></p>



<p class="has-small-font-size">Deployment alone doesn’t guarantee security. Misconfigurations, unpatched vulnerabilities, or improper access controls can leave even an isolated vault exposed. Hardening ensures the vault is configured correctly, continuously validated, and integrated into your wider backup and security architecture.</p>



<p class="has-small-font-size"><strong>3. How does StorageGuard work with cyber vaults?</strong></p>



<p class="has-small-font-size">StorageGuard scans backup and vault environments for vulnerabilities, misconfigurations, and policy drift. It compares configurations to vendor hardening guidelines and compliance frameworks, prioritizes risks, and provides remediation guidance. It supports multi-vendor environments and ensures vaults remain secure post-deployment.</p>



<p class="has-small-font-size"><strong>4. Can a cyber vault protect against data poisoning attacks?</strong></p>



<p class="has-small-font-size">Not by itself. A vault will preserve any data ingested into it – clean or corrupted. This makes data poisoning a real risk. StorageGuard mitigates this by monitoring backup pipelines for suspicious changes and validating data before it enters the vault, ensuring only trusted copies are preserved.</p>



<p class="has-small-font-size"><strong>5. Is a cyber vault the same as immutable backups?</strong></p>



<p class="has-small-font-size">Not exactly. Immutable backups are a feature; a cyber vault combines immutability with isolation, access control, and recovery workflows. Together, they create a secure environment where critical data can be restored even after a major cyberattack.</p>



<p class="has-small-font-size"><strong>6. Do I need StorageGuard if my vendor already provides a vault solution?</strong></p>



<p class="has-small-font-size">Yes. Vendor vaults provide isolation and immutability for their own ecosystem. StorageGuard complements them by providing multi-vendor visibility, ongoing vulnerability management, configuration baseline enforcement, and compliance reporting across your entire backup infrastructure – including the vault.</p>



<p class="has-small-font-size"><strong>7. Which vendors offer cyber vault solutions?</strong></p>



<p class="has-small-font-size">Popular cyber vault implementations include HPE Cyber Vault, Cohesity FortKnox, NetApp Cyber Vault, Dell PowerProtect Cyber Recovery Vault, Rubrik Vault, Commvault Cleanroom &amp; Cyber Vault, IBM Cyber Vault, and Veeam Cyber Vault.</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience/">Beyond the Vault: Hardening Your Backups for Ultimate Cyber Resilience</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gartner Calls for Storage &#038; Backup Hardening to Combat Ransomware</title>
		<link>https://www.continuitysoftware.com/blog/gartner-calls-for-storage-backup-hardening-to-combat-ransomware/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 14:18:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/?p=13283</guid>

					<description><![CDATA[<p>When we talk about cybersecurity, storage and backup systems rarely get the spotlight. But in today’s evolving threat landscape, ignoring them can be catastrophic. Recent cyberattacks</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/gartner-calls-for-storage-backup-hardening-to-combat-ransomware/">Gartner Calls for Storage &amp; Backup Hardening to Combat Ransomware</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>When we talk about cybersecurity, storage and backup systems rarely get the spotlight. But in today’s evolving threat landscape, ignoring them can be catastrophic. Recent cyberattacks have shown that these foundational components — once seen as technical backend concerns — are now front-line targets.</p>



<p>Gartner recently emphasized the need for much stricter security in its new report, <a href="https://www.gartner.com/en/documents/6611202" target="_blank" rel="noreferrer noopener"><strong>Hype Cycle for Storage Technologies, 2025</strong></a>. Gartner analyst Julia Palmer focused on emerging storage technologies on infrastructure outcomes, as well as their adoption rates and maturity levels.</p>



<p>The goal was to help Storage &amp; Infrastructure Leaders develop strategies to deliver secure, innovative and future-proof storage platforms that meet business requirements.</p>



<p>One of the key technologies highlighted in the report was ‘Cyberstorage’, which in Gartner’s words: “actively defends storage systems and data against cyberattacks through prevention, early detection and attack blocking.”</p>



<p>From ransomware to insider threats, if your&nbsp;primary storage is compromised, hundreds or thousands of workloads — databases, containers, VMs — can go down in a flash.</p>



<p>Worse still, if your&nbsp;backup systems are compromised, there’s&nbsp;no Plan B. No way to recover. You’re out of options.</p>



<p>On average, <a href="https://www.continuitysoftware.com/resources/the-2025-security-maturity-of-storage-data-protection-systems/?utm_source=mmdy">each enterprise storage or backup device has&nbsp;10 vulnerabilities, including&nbsp;5 critical or high-severity&nbsp;ones</a>. Yet many organizations have limited visibility into these weaknesses.</p>



<p>While traditional security solutions exist at the network perimeter, storage systems often fall short in safeguarding against malicious activities. Cyberstorage solutions offer robust active defense against, and recovery from, cyberattacks targeting data storage systems – and their data.</p>



<p><strong>Gartner Recommendations:</strong></p>



<ul class="wp-block-list">
<li>Prioritize active defense and security of unstructured and structured data storage systems, because identifying and blocking an attack is just as important as recovering from one</li>



<li>Avoid relying solely on data backups and snapshot methods to address cyber resilience concerns. These should serve as a last resort for disaster recovery rather than a proactive defense for your data.</li>



<li>Select storage vendors based on their ability to support all the pillars of the <a href="https://www.continuitysoftware.com/resources/nist-guide-for-storage-security-2/?utm_source=DY">National Institute of Standards and Technology (NIST) Cybersecurity Framework</a> (i.e., Govern, Identify, Protect, Detect, Respond and Recover)</li>



<li>Upgrade existing storage infrastructure with vendor offerings and SLAs that include cyberstorage capabilities. Also, investigate the cyberstorage capabilities of your existing vendors, as many of them are adding cyberstorage services alongside their storage services</li>
</ul>



<p><strong>Solving the Cyberstorage Shortfall</strong></p>



<p><a href="http://www.continuitysoftware.com/">StorageGuard&nbsp;</a>is the industry’s first dedicated&nbsp;<strong>security hardening and vulnerability management platform</strong>&nbsp;<strong>purpose-built for enterprise storage and backup</strong>&nbsp;environments.</p>



<p>It scans, detects, and prioritizes vulnerabilities, misconfigurations, and compliance gaps across multi-vendor storage and backup systems, enabling organizations to proactively secure their critical data infrastructure.</p>



<p>StorageGuard also performs&nbsp;<strong>secure configuration analysis</strong>, allowing organizations to assess their storage and backup environments against security best practices, review baseline configuration findings, and implement hardening measures to reduce the risk of future attacks.</p>



<p><strong>Final Thoughts</strong></p>



<p>Storage and backup systems are your organization’s most critical — and ironically most overlooked — assets. They deserve the same security rigor as endpoints, networks, and apps.</p>



<p>With attacks intensifying and standards evolving, now is the time to&nbsp;prioritize vulnerability management and configuration hardening for your storage and backup infrastructure.</p>



<p><strong>Read the full report:</strong></p>



<p><a href="https://www.gartner.com/en/documents/6611202" target="_blank" rel="noreferrer noopener"><strong>Hype Cycle for Storage Technologies, 2025</strong></a>&nbsp;(For Gartner Subscribers only).&nbsp;</p>



<p></p>
<p>The post <a href="https://www.continuitysoftware.com/blog/gartner-calls-for-storage-backup-hardening-to-combat-ransomware/">Gartner Calls for Storage &amp; Backup Hardening to Combat Ransomware</a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exploited and Exposed: Storage and Backup Systems Are Under Attack </title>
		<link>https://www.continuitysoftware.com/blog/exploited-and-exposed-storage-and-backup-systems-are-under-attack/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Mon, 23 Jun 2025 10:49:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://continuityswst.wpengine.com/?p=13276</guid>

					<description><![CDATA[<p>Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems  Enterprise storage and backup systems have become a high-priority target for cybercriminals. In the last</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/exploited-and-exposed-storage-and-backup-systems-are-under-attack/">Exploited and Exposed: Storage and Backup Systems Are Under Attack </a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-cc07da17e75b791fc2310f6c40d1b658" style="color:#0f2076"><strong>Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems</strong> </h3>



<p>Enterprise storage and backup systems have become a high-priority target for cybercriminals. In the last two months alone, there has been a dramatic escalation in the discovery—and in some cases exploitation—of critical vulnerabilities across leading storage and data protection platforms. With past attention focused on vendors like Veeam and MinIO, the threat landscape has now broadened to include major enterprise players such as IBM, Veritas, HPE, Dell, Commvault, and Broadcom.<strong> </strong>&nbsp;</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-466d8b1d62d0001be72ed5ac65be4456" style="color:#0f2076"><strong>Critical Vulnerabilities Emerge Across Leading Vendors</strong> </h3>



<p><strong>IBM: Privilege Escalation in BRMS</strong>&nbsp;</p>



<p>On June 16, IBM disclosed a severe flaw in its Backup, Recovery, and Media Services (BRMS). The vulnerability enables low-privileged users to execute arbitrary, user-controlled code with elevated system access—potentially compromising the host’s operating system and exposing enterprise infrastructure to systemic risk.&nbsp;</p>



<p><strong>Veeam:</strong> <strong>New flaw lets domain users hack backup servers</strong>&nbsp;</p>



<p>Also announced on June 16, Veeam’s security updates to fix several vulnerabilities, including a critical remote code execution, which impacts domain-joined installations.&nbsp;</p>



<p>With many organizations integrating their backup servers into the corporate Windows domain, they are inadvertently disregarding <a href="https://bp.veeam.com/security/Design-and-implementation/Hardening/Workgroup_or_Domain.html#best-practice" target="_blank" rel="noreferrer noopener">Veeam’s security best practices</a>. These guidelines advise Backup Admins to use a separate Active Directory Forest and protect the administrative accounts with two-factor authentication.   </p>



<p><strong>HPE: Remote Code Execution in StoreOnce</strong>&nbsp;</p>



<p>On June 6, HPE announced several vulnerabilities in its StoreOnce software. These flaws allow remote attackers to bypass authentication, run malicious code, and extract sensitive enterprise data. The risk spans both data compromise and operational disruption.&nbsp;</p>



<p><strong>Dell: Full Filesystem Access in PowerScale OneFS</strong>&nbsp;</p>



<p>Also on June 6, Dell reported two serious vulnerabilities in its PowerScale OneFS storage OS. The most severe allows unauthenticated attackers to gain full, unauthorized access to enterprise file systems—jeopardizing data integrity and confidentiality at scale.&nbsp;</p>



<p><strong>CISA Flags CVE-2025-32433: Impacting Cisco and NetApp</strong>&nbsp;</p>



<p>On June 10, the Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert for a critical vulnerability in Erlang/OTP’s SSH implementation that was added to the known exploited vulnerabilities catalog. This zero-auth flaw enables remote command execution. The threat affects also widely used storage platforms from vendors like Cisco and NetApp, which rely on Erlang-based components.&nbsp;</p>



<p><strong>Commvault: Confirmed Exploitation in the Wild</strong>&nbsp;</p>



<p>On April 28, two newly disclosed Commvault vulnerabilities—CVE-2025-34028 and CVE-2025-3928—have been added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog. These flaws allow remote code execution (RCE) and persistent webshell access, putting enterprise data protection and disaster recovery processes at serious risk.&nbsp;</p>



<ul class="wp-block-list">
<li><strong>CVE-2025-34028</strong> (CVSS 10.0): An unauthenticated ZIP file path traversal vulnerability enabling RCE. </li>
</ul>



<ul class="wp-block-list">
<li><strong>CVE-2025-3928</strong>: Allows authenticated attackers to deploy persistent backdoors via webshells. </li>
</ul>



<p><strong>Broadcom (Brocade) Fabric OS: Privilege Escalation to Root Access</strong>&nbsp;</p>



<p>Also appearing in CISA’s KEV Catalog on April 28, CVE-2025-1976 affects Brocade’s SAN switches and directors. This flaw enables an admin-level user to escalate privileges and gain full root access to the operating system, allowing arbitrary command execution and manipulation of the Fabric OS.&nbsp;</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-cf959b695a8dd1aac6238fef7cd34068" style="color:#0f2076"><strong>New Industry Report Reveals Widespread Risk</strong> </h3>



<p>Last week, Continuity released its third annual analysis: <a href="https://www.continuitysoftware.com/resources/the-2025-security-maturity-of-storage-data-protection-systems/?utm_source=mmdy" target="_blank" rel="noreferrer noopener"><strong><em>“The 2025 Security Maturity of Storage &amp; Data Protection Systems.”</em></strong></a> The study assessed 323 enterprise environments encompassing 11,435 storage and backup systems across top vendors such as Dell, NetApp, Rubrik, Cohesity, Veritas, Hitachi Vantara, Pure, IBM, and others.&nbsp;</p>



<p><strong>Key Findings:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>6,085 distinct security issues uncovered—spanning over 390 failed security principles </li>
</ul>



<ul class="wp-block-list">
<li>On average, each storage and backup system contains 10 security risks, 5 of which are classified as high or critical </li>
</ul>



<ul class="wp-block-list">
<li>The most common risk areas include: 
<ul class="wp-block-list">
<li>Authentication &amp; identity management </li>



<li>Unaddressed CVEs </li>



<li>Encryption misconfigurations</li>



<li>Access control &amp; authorization gaps </li>



<li>Improper use of ransomware protection features </li>
</ul>
</li>
</ul>



<p>This data reinforces the growing reality that most enterprise environments remain significantly under-secured at the data protection layer, despite mounting threats.&nbsp;</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-dfe95cbb281a1e29d77f87c5868480bb" style="color:#0f2076"><strong>The Trend: Targeting Storage and Backup as a Primary Attack Vector</strong> </h3>



<p>Attackers are zeroing in on storage and backup systems as prime targets. Why? Because these systems are the last line of defense for data storage and business continuity—and compromising them disables recovery, facilitates ransomware extortion, and opens pathways to broader lateral movement.&nbsp;</p>



<p>One high-profile example: the largest data breach in history at UnitedHealth, where attackers successfully disabled the backup environment, preventing data recovery and causing months-long operational disruption.&nbsp;</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-839ca44e763ff0bd05d126febad67de7" style="color:#0f2076"><strong>Why Storage and Backup Systems Are High-Value Targets</strong> </h3>



<p>Storage and backup systems are foundational to enterprise data resilience. By compromising them, attackers can:&nbsp;</p>



<ul class="wp-block-list">
<li>Neutralize recovery capabilities (especially in ransomware attacks) </li>
</ul>



<ul class="wp-block-list">
<li>Exfiltrate sensitive data </li>
</ul>



<ul class="wp-block-list">
<li>Destroy or corrupt primary data or backup data copies </li>
</ul>



<ul class="wp-block-list">
<li>Use these platforms as stealthy pivot points to compromise broader IT environments </li>
</ul>



<p>Despite their criticality, these systems are often under-secured. Many security teams lack visibility, tooling, or expertise to adequately defend them.&nbsp;</p>



<h3 class="wp-block-heading has-text-color has-link-color wp-elements-4016e50de77ab1162729f40ad511d43e" style="color:#0f2076"><strong>Conclusion: The Back-End is Now Front-Line</strong> </h3>



<p>The recent wave of actively exploited vulnerabilities is a stark reminder: storage and backup systems are not just infrastructure—they’re high-value assets under direct attack. It’s time they receive the same security scrutiny and operational rigor as front-line systems. Tools like <a href="https://www.continuitysoftware.com/storageguard/" target="_blank" rel="noreferrer noopener">StorageGuard</a> are critical in bridging this gap and defending one of the most vulnerable layers of the modern enterprise.&nbsp;</p>
<p>The post <a href="https://www.continuitysoftware.com/blog/exploited-and-exposed-storage-and-backup-systems-are-under-attack/">Exploited and Exposed: Storage and Backup Systems Are Under Attack </a> appeared first on <a href="https://www.continuitysoftware.com">Continuity™</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
