<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Core6</title>
	<atom:link href="https://www.core6.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.core6.com/</link>
	<description>Validate the Security of Your Storage &#38; Backups</description>
	<lastBuildDate>Mon, 11 May 2026 15:31:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.core6.com/wp-content/uploads/2025/10/cropped-favicon-32x32.png</url>
	<title>Core6</title>
	<link>https://www.core6.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How Qualys and Core6 Are Redefining Risk Visibility in the Age of AI</title>
		<link>https://www.core6.com/blog/how-qualys-and-core6-are-redefining-risk-visibility-in-the-age-of-ai/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Mon, 11 May 2026 15:00:27 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/determining-enterprise-storage-and-backup-asset-criticality-2/</guid>

					<description><![CDATA[<p>For years, cybersecurity followed a familiar rhythm. We hardened endpoints. We added controls to networks and applications. We refined detection. We rehearsed response. And then AI</p>
<p>The post <a href="https://www.core6.com/blog/how-qualys-and-core6-are-redefining-risk-visibility-in-the-age-of-ai/">How Qualys and Core6 Are Redefining Risk Visibility in the Age of AI</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>For years, cybersecurity followed a familiar rhythm. We hardened endpoints. We added controls to networks and applications. We refined detection. We rehearsed response. </p>



<p>And then AI started to change the economics of attack.</p>



<p>AI didn’t invent ransomware or exploitation – but it compressed time, expanded scale, and lowered the cost of finding weak systems. The result is something we’re starting to see play out: attackers no longer look for the <em>most sophisticated</em> target. They look for the <em>most consequential</em> one.</p>



<p>And increasingly, that target is storage and backup systems.</p>



<p>This shift reflects a deeper pattern – what you might call an <strong>Anthropic Mythos of AI in cybersecurity</strong>. Not the myth of superintelligence, but the reality that AI accelerates whatever incentives already exist.</p>



<p>Attackers want leverage. And guess what; storage and backup systems provide it. AI simply helps them find the cracks faster.</p>



<p class="has-medium-font-size"><strong>The Blind Spot AI Loves</strong></p>



<p>One of the most uncomfortable truths in modern security programs is how uneven our visibility really is.</p>



<p>Endpoints, networks, applications – these are continuously scanned, prioritized, scored. Storage and backup systems? Often assumed safe. Too complex. Too sensitive. Too “infrastructure‑owned” to fit neatly into exposure management programs.</p>



<p>Attackers have figured this out.</p>



<p>Research shows that <strong>the majority of ransomware incidents now explicitly target </strong><strong>storage and backup repositories</strong> to prevent recovery and force payment. When backups are compromised, incidents turn into crises: longer downtime, regulatory fallout, operational paralysis.</p>



<p>AI doesn’t need to “break” storage and backup systems. It just needs to identify which ones haven’t been treated like first‑class citizens in the security model.</p>



<p class="has-medium-font-size"><strong>From Feature AI to Risk AI</strong></p>



<p>One of the most important AI trends in cybersecurity isn’t about flashy capabilities – it’s about context.</p>



<p>AI is shifting security away from isolated findings and toward risk understanding:</p>



<ul class="wp-block-list">
<li>Which weaknesses matter <em>most</em>?</li>



<li>Which systems amplify business impact?</li>



<li>Which issues collapse recovery options?</li>
</ul>



<p>This is where storage and backup security finally enters the risk conversation, rather than sitting outside it.</p>



<p>The joint approach from <strong><a href="https://www.qualys.com/">Qualys Enterprise TruRisk&#x2122;</a> and </strong><strong>Core6’s <a href="http://www.core6.com/">StorageGuard</a></strong> reflects this shift. Instead of treating storage as an architectural special case, it becomes another – critically important – risk domain that can be assessed, prioritized, and acted on alongside endpoints and applications.</p>



<p>Not more data. More meaning.</p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><a href="https://www.core6.com/wp-content/uploads/2026/05/Core6-Qualys-Solution-Brief.pdf" target="_blank" rel=" noreferrer noopener"><img fetchpriority="high" decoding="async" width="1024" height="256" data-id="13868" src="https://www.core6.com/wp-content/uploads/2026/05/Welcome-to-Ms-Claires-Class-Google-Classroom-Header-1-1024x256.png" alt="" class="wp-image-13868" srcset="https://www.core6.com/wp-content/uploads/2026/05/Welcome-to-Ms-Claires-Class-Google-Classroom-Header-1-1024x256.png 1024w, https://www.core6.com/wp-content/uploads/2026/05/Welcome-to-Ms-Claires-Class-Google-Classroom-Header-1-300x75.png 300w, https://www.core6.com/wp-content/uploads/2026/05/Welcome-to-Ms-Claires-Class-Google-Classroom-Header-1-150x38.png 150w, https://www.core6.com/wp-content/uploads/2026/05/Welcome-to-Ms-Claires-Class-Google-Classroom-Header-1-768x192.png 768w, https://www.core6.com/wp-content/uploads/2026/05/Welcome-to-Ms-Claires-Class-Google-Classroom-Header-1-1536x384.png 1536w, https://www.core6.com/wp-content/uploads/2026/05/Welcome-to-Ms-Claires-Class-Google-Classroom-Header-1-2048x512.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>
</figure>



<p><strong>Why AI-Driven Attackers Go After Recovery</strong></p>



<p>There’s something almost narratively predictable about modern ransomware campaigns.</p>



<p>If you think in Anthropic terms – systems shaped by incentives – the logic is clear:</p>



<ul class="wp-block-list">
<li>Attackers don’t want denial of service.</li>



<li>They want negotiation advantage.</li>



<li>Recovery infrastructure is the leverage point.</li>
</ul>



<p>AI accelerates reconnaissance and vulnerability clustering. It surfaces misconfigurations, exposed interfaces, and hardening gaps – especially in complex, multi‑vendor storage and backup environments that rarely get consistent scrutiny. That’s why continuous autonomous validation matters more than episodic checks. StorageGuard’s scan of storage and backup systems – aligned to vendor hardening guides and industry standards – feeds directly into Qualys’ risk context, turning “invisible infrastructure” into actionable cyber risk.</p>



<p class="has-medium-font-size"><strong>One Risk Model, Not Two Worlds</strong></p>



<p>Another quiet AI trend in cybersecurity is consolidation – not of vendors, but of decision models.</p>



<p>Security teams don’t need separate mental frameworks for infrastructure risk and cyber risk. They need one shared language of exposure and impact.</p>



<p>By surfacing storage and backup security advisories, vulnerabilities, security misconfigurations and compliance issues directly inside Qualys workflows, organizations can:</p>



<ul class="wp-block-list">
<li>Prioritize remediation based on business risk, not just technical severity</li>



<li>Align Infrastructure and SecOps teams around the same risk signals</li>



<li>Reduce friction caused by siloed tools and disconnected ownership</li>
</ul>



<p>This matters because AI-driven attacks don’t respect org charts. Defense shouldn’t either.</p>



<p class="has-medium-font-size"><strong>The End of “Safe by Assumption”</strong></p>



<p>If there’s one myth AI is breaking in cybersecurity, it’s the idea that anything is secure simply because it’s complex, critical, or historically untouched.</p>



<p>Storage and backup systems are no longer passive repositories. They’re active battlegrounds in modern attacks.</p>



<p>The organizations that adapt fastest aren’t chasing AI hype. They’re asking better questions:</p>



<ul class="wp-block-list">
<li>Where do attackers gain leverage?</li>



<li>Which systems eliminate recovery when they fail?</li>



<li>Which risks have we normalized for too long?</li>
</ul>



<p>AI doesn’t answer those questions for us. But it ensures attackers are asking them already.</p>



<p>The only real choice is whether defenders catch up.</p>



<p class="has-medium-font-size"><strong>Visit the Core6 profile on the Qualys Partner Portal:</strong> <a href="https://technologypartners.qualys.com/partners/core6">https://technologypartners.qualys.com/partners/core6</a></p>



<p class="has-small-font-size"></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p style="font-size:15px"><strong>Frequently Asked Questions (FAQs)</strong></p>



<h3 class="wp-block-heading has-small-font-size"><strong>1. How does Qualys address storage and backup security risk?</strong></h3>



<p class="has-small-font-size">Qualys integrates storage and backup risks into its Enterprise TruRisk&#x2122; model, allowing organizations to assess, prioritize, and remediate recovery‑related exposures using the same workflows applied to endpoints, networks, and applications.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>2. What role does Core6 StorageGuard play in cyber risk management?</strong></h3>



<p class="has-small-font-size">Core6 StorageGuard continuously evaluates storage and backup systems against vendor hardening guidelines and security standards, surfacing misconfigurations and vulnerabilities that feed directly into enterprise risk workflows.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>3. What does “one risk model” mean in cybersecurity?</strong></h3>



<p class="has-small-font-size">A single risk model unifies infrastructure and cybersecurity risk, helping security, infrastructure, and operations teams prioritize remediation based on business impact instead of working in disconnected silos.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>4. How is AI shifting cybersecurity toward risk‑based decision making?</strong></h3>



<p class="has-small-font-size">AI is moving cybersecurity from isolated vulnerability findings to risk understanding—helping teams assess which weaknesses create the greatest operational, financial, and recovery impact rather than prioritizing issues based only on technical severity.</p>



<p></p>
<p>The post <a href="https://www.core6.com/blog/how-qualys-and-core6-are-redefining-risk-visibility-in-the-age-of-ai/">How Qualys and Core6 Are Redefining Risk Visibility in the Age of AI</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Determining Asset Criticality in Enterprise Storage and Backup Environments</title>
		<link>https://www.core6.com/blog/determining-enterprise-storage-and-backup-asset-criticality/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 07:40:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/ai-security-for-storage-and-backup-systems-storageguard-mcp-2/</guid>

					<description><![CDATA[<p>Enterprise storage and backup platforms are foundational to enterprise data services, enabling business continuity, cyber recovery, and regulatory compliance. As AI accelerates initial compromise and lateral</p>
<p>The post <a href="https://www.core6.com/blog/determining-enterprise-storage-and-backup-asset-criticality/">Determining Asset Criticality in Enterprise Storage and Backup Environments</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Enterprise storage and backup platforms are foundational to enterprise data services, enabling business continuity, cyber recovery, and regulatory compliance. As AI accelerates initial compromise and lateral movement, these systems &#8211; central to the IT control plane &#8211; become high‑value targets, holding vast amounts of sensitive data, protecting hundreds or thousands of workloads, and ultimately determining an organization’s ability to recover from destructive cyber events.</p>



<p>While many storage and backup platforms are rightly classified as critical, <strong>criticality is not a single tier but a spectrum</strong>. </p>



<p>Differences in failure modes, recoverability impact, exposure, maturity, and regulatory scope mean that some systems demand earlier attention, deeper validation, or stronger controls than others. </p>



<p>A structured, multi‑dimensional approach enables security teams to make deliberate, risk‑based prioritization decisions &#8211; even within the critical asset set &#8211; across both steady‑state operations and worst‑case recovery scenarios.</p>



<p><strong>Below we outline practical criteria to assess and compare criticality across the enterprise storage and backup estate.</strong></p>



<p class="has-medium-font-size"><strong>Storage &amp; Backup Asset Criticality Criteria</strong></p>



<p>The criterions are divided into four categories: Operational, Technological, Physical Characteristics and finally Governance Compliance and regulatory considerations.</p>



<p><strong>Category 1: Operational context</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Criterion</strong></td><td><strong>Guidance</strong></td></tr><tr><td><strong>Operational Role</strong></td><td>Identify the system’s role: Production, DR, Primary Backup, Secondary/Archive, Reporting, UAT, Dev, or Lab. Systems directly supporting production or recovery typically rank higher.</td></tr><tr><td><strong>Data Sensitivity</strong></td><td>Evaluate the sensitivity of stored data (PII, PHI, IP, financial, regulated data, etc.).</td></tr><tr><td><strong>Application &amp; Business Tier</strong></td><td>Map systems to application tiers and business services (Tier‑0/1/2, revenue‑generating, mission‑critical, supporting). Business context is key to meaningful criticality scoring.</td></tr><tr><td><strong>M&amp;A and Inherited Systems</strong></td><td>Storage and backup systems acquired through mergers or acquisitions should be treated as high‑risk until aligned with enterprise standards and validated.</td></tr></tbody></table></figure>



<p><strong>Category 2: Technology context</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Criterion</strong></td><td><strong>Guidance</strong></td></tr><tr><td><strong>RPO/RTO of Associated Servers</strong></td><td>The tighter the Recovery Point Objective and Recovery Time Objective of protected workloads, the higher the inherited criticality of the storage or backup system.</td></tr><tr><td><strong>Replication and Recoverability</strong></td><td>Assess whether the system is replicated, air‑gapped, isolated, or represents the <em>last viable recovery point</em>. Such systems become Tier‑0 assets during destructive failures.</td></tr><tr><td><strong>Access Density</strong></td><td>Consider the number and criticality of dependent servers, applications, services, and management integrations. High fan‑in significantly increases blast radius and business impact.</td></tr><tr><td><strong>Data Volume</strong></td><td>Larger data volumes increase blast radius, recovery complexity, and incentive for attackers.</td></tr><tr><td><strong>Level of Administrative Control</strong></td><td>Determine whether the system is centrally managed (HQ) or administered in remote offices. Distributed control often increases configuration drift and risk.</td></tr><tr><td><strong>Vaulted &amp; Immutable Systems</strong></td><td>Systems intended for immutability, cyber recovery, or vaulting must be hardened more aggressively, as they represent the organization’s final recovery option.</td></tr><tr><td><strong>AI / ML Training and Inference Storage</strong></td><td>Storage and backup systems supporting AI/ML workloads (such as training data, model artifacts, or inference pipelines) often warrant elevated criticality. They typically hold high‑value data, change rapidly, have amplified blast radius due to reuse, and directly affect model integrity and business outcomes.</td></tr></tbody></table></figure>



<p><strong>Category 3: Physical Characteristics</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Criterion</strong></td><td><strong>Guidance</strong></td></tr><tr><td><strong>Geographical exposure</strong></td><td>Assess network placement: DMZ, internet‑facing zones, or proximity (“distance”) to web‑facing systems. East‑west exposure matters as much as north‑south.</td></tr><tr><td><strong>Physical security and accessibility</strong></td><td>Systems with weaker physical controls, broader on‑site access, or shared facilities warrant higher criticality due to the increased impact of physical compromise.</td></tr></tbody></table></figure>



<p><strong>Category 4: Governance Compliance and regulatory considerations</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Criterion</strong></td><td><strong>Guidance</strong></td></tr><tr><td><strong>Applicable regulation and frameworks</strong></td><td>Systems subject to multiple compliance frameworks—or stricter regulatory requirements—should be prioritized higher due to the compounded impact of control failures.</td></tr><tr><td><strong>Security Tooling Coverage</strong></td><td>Prioritize systems that cannot support agents or are historically excluded from security scans. These are often less mature and under‑assessed.</td></tr><tr><td><strong>Assessment &amp; Validation History</strong></td><td>Consider the last security or configuration assessment, frequency of reassessments, and whether continuous validation is in place. Assumed security degrades quickly over time.</td></tr></tbody></table></figure>



<p class="has-medium-font-size"><strong>Final Thought</strong></p>



<p>Storage and backup systems are no longer passive infrastructure components. They are primary security assets, with risk profiles that change dramatically under failure or attack. In a world where the control plane is the new perimeter, these systems have become prime targets.</p>



<p>By applying a structured criticality model &#8211; one that balances operational importance, recoverability impact, and security maturity &#8211; organizations can: </p>



<ul class="wp-block-list">
<li>Prioritize hardening and validation efforts</li>



<li>Reduce blind spots attackers increasingly exploit</li>



<li>Make defensible, risk‑based decisions aligned with business impact</li>
</ul>



<p class="has-medium-font-size"></p>



<p class="has-small-font-size"></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p style="font-size:15px"><strong>Frequently Asked Questions (FAQ)</strong></p>



<h3 class="wp-block-heading has-small-font-size"><strong>1. Why do storage and backup systems need their own criticality model?</strong></h3>



<p class="has-small-font-size">Storage and backup platforms (from the likes of Dell, NetApp, Hitachi Vantara, HPE, IBM, Everpure (formerly Pure), VAST Data, Rubrik, Commvault, Cohesity, Broadcom, Cisco, etc.) differ fundamentally from traditional applications or servers. They often protect hundreds or thousands of workloads, store highly sensitive data, and become the <em>last line of defense</em> during ransomware or destructive attacks. Applying a generic asset classification model usually underestimates their blast radius, recovery impact, and attacker value.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>2. Aren’t all storage and backup systems already “critical”?</strong></h3>



<p class="has-small-font-size">They are &#8211; but not equally so. Criticality is a spectrum, not a single tier. Differences in data sensitivity, dependency density, recoverability role, exposure, and governance maturity mean some systems demand earlier hardening, deeper validation, or stricter controls than others—especially under worst‑case recovery scenarios.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>3. Why does “access density” matter so much?</strong></h3>



<p class="has-small-font-size">High fan‑in systems &#8211; those connected to many servers, applications, and management tools—have an amplified blast radius. A single misconfiguration or compromise can cascade across large portions of the environment, making access density one of the strongest predictors of risk.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>4. How do AI and ML workloads change storage and backup criticality?</strong></h3>



<p class="has-small-font-size">AI/ML systems often store high‑value datasets, model artifacts, and training pipelines that are reused across teams and products. Compromise can affect model integrity, business decisions, and downstream systems, elevating both the security and operational impact of the supporting storage platforms.</p>



<p></p>
<p>The post <a href="https://www.core6.com/blog/determining-enterprise-storage-and-backup-asset-criticality/">Determining Asset Criticality in Enterprise Storage and Backup Environments</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyberstorage Comes of Age: Why Security Posture Management Is Now Critical for Storage &#038; Backup</title>
		<link>https://www.core6.com/blog/cyberstorage-comes-of-age-why-security-posture-management-is-critical-for-storage-and-backup/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 09:20:09 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/ai-security-for-storage-and-backup-systems-storageguard-mcp-2/</guid>

					<description><![CDATA[<p>Enterprise cyber resilience strategies are undergoing a fundamental shift. Storage is no longer a passive repository for data and backups – it is becoming an active</p>
<p>The post <a href="https://www.core6.com/blog/cyberstorage-comes-of-age-why-security-posture-management-is-critical-for-storage-and-backup/">Cyberstorage Comes of Age: Why Security Posture Management Is Now Critical for Storage &amp; Backup</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Enterprise cyber resilience strategies are undergoing a fundamental shift. Storage is no longer a passive repository for data and backups – it is becoming an active control point in cyber defense. This shift is being driven by real‑world demand from enterprise buyers.</p>



<p>In fact, Gartner reports a 187% year‑over‑year increase in client inquiries related to data resiliency in 2025 compared with 2024, underscoring how urgently organizations are rethinking their ability to protect and recover business‑critical data.</p>



<p>In parallel, <strong>inquiries explicitly focused on cyberstorage grew by 167% over the same period</strong>, highlighting the acceleration of storage‑layer security as a standalone priority – not just an extension of backup or recovery tools.</p>



<p class="has-medium-font-size"><strong>From Backup-Centric Recovery to Active Storage Defense</strong></p>



<p>Traditional cyber resilience approaches focused heavily on backup frequency, immutable snapshots, and recovery time objectives. While these capabilities remain essential, they are no longer sufficient on their own.</p>



<p>Modern ransomware and data‑centric attacks are designed to evade detection, compromise administrative credentials, and directly target storage &amp; backup systems</p>



<p>The <em>Market Guide for Cyberstorage</em> describes how cyberstorage embeds security directly into storage and backup platforms, focusing on posture hardening, continuous validation, and recovery assurance.</p>



<p>Put simply: <strong>backup is reactive by nature; storage must now participate proactively in cyber defense</strong>.</p>



<p class="has-medium-font-size"><strong>Why Storage &amp; Backup Security Posture Management Matters</strong></p>



<p>As cyberstorage capabilities mature, Gartner emphasizes that consistent execution and hardened security posture across different storage and backup platforms are far more important than individual features, especially in large enterprises operating multivendor storage and backup ecosystems and legacy infrastructure alongside newer platforms.</p>



<p>In practice, this complexity leads to uneven protection. Native security features may exist on some platforms but not others. Policies drift over time. Privileged access expands quietly. Recovery assumptions go untested.</p>



<p>Storage and backup security posture management addresses these realities by continuously assessing and validating:</p>



<ul class="wp-block-list">
<li>Configuration baselines across storage and backup platforms – and deviations or drifts that happen over time</li>



<li>Exposure to security advisories, vulnerabilities, and security misconfigurations</li>



<li>Alignment with industry standards, regulation, and cybersecurity frameworks</li>
</ul>



<p>Without posture management, organizations often discover gaps only during an incident – when it is already too late.</p>



<p class="has-medium-font-size"><strong>Cyberstorage in Multivendor, Legacy, and Hybrid Environments</strong></p>



<p>A key insight from the Market Guide is that, while many storage vendors are embedding baseline cyberstorage features, capability depth and maturity remain uneven – particularly across:</p>



<ul class="wp-block-list">
<li>Multivendor environments</li>



<li>Older or legacy storage platforms</li>



<li>Complex hybrid cloud architectures</li>
</ul>



<p>As a result, many enterprises continue to adopt specialized cyberstorage solutions to provide independent validation, consistent policy enforcement, and unified visibility across their entire storage and backup estate.</p>



<p>These solutions are especially important in environments where organizations must assume that administrative credentials may be compromised – and where recovery workflows must remain trusted and operable under active attack conditions.</p>



<p class="has-medium-font-size"><strong>StorageGuard by Core6: A Representative Vendor in Cyberstorage</strong></p>



<p>In the <em>Gartner Market Guide for Cyberstorage</em>, Core6 (previously ‘Continuity’) &nbsp;is named as a <strong>Representative Vendor</strong><strong> </strong>based on our StorageGuard solution, reflecting its role in addressing the growing need for security posture management.</p>



<p>StorageGuard focuses on continuously assessing and hardening storage and backup environments, helping organizations uncover misconfigurations, security gaps, and latent risks across diverse platforms. By delivering cross‑vendor visibility and posture enforcement, StorageGuard supports the core cyberstorage outcomes highlighted in the Market Guide.</p>



<p>This posture‑driven approach is particularly valuable for large enterprises, where operational complexity – not lack of technology – is often the biggest obstacle to cyber resilience.</p>



<p><strong>Download the <a href="https://www.gartner.com/document-reader/document/7490653?ref=solrAll&amp;refval=539314663&amp;">Gartner® Market Guide for Cyberstorage</a></strong></p>



<p class="has-small-font-size"><em>Attribution: Gartner, Market Guide for Cyberstorage, Vishesh Divya, 23 February 2026.</em></p>



<p class="has-small-font-size"><em>Disclaimer: GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</em></p>



<p class="has-small-font-size"><em>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</em></p>



<p class="has-medium-font-size"></p>



<p class="has-small-font-size"></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p style="font-size:15px"><strong>Frequently Asked Questions (FAQ)</strong></p>



<h3 class="wp-block-heading has-small-font-size"><strong>1. What is cyberstorage?</strong></h3>



<p class="has-small-font-size">Cyberstorage is an approach to securing enterprise storage that embeds <strong>active detection, containment, and recovery assurance directly at the data layer</strong>, rather than relying solely on backup or perimeter security. It treats storage systems as active participants in cyber defense, capable of detecting early-stage attacks, limiting blast radius, and validating recovery readiness.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>2. What is security posture management for <strong>storage and backup</strong>?</strong></h3>



<p class="has-small-font-size">Storage and backup security posture management is the continuous assessment and hardening of storage and backup environments to ensure they are securely configured, resilient to attack, and aligned with cyber resilience best practices. It focuses on identifying misconfigurations, privilege risks, policy gaps, and exposure that could undermine recovery during a cyber incident.</p>



<p class="has-small-font-size"><strong>3. Why are multivendor storage environments harder to secure?</strong></p>



<p class="has-small-font-size">Multivendor environments often have inconsistent security models, visibility gaps, and uneven maturity across platforms. Native protection features vary widely between vendors, making it difficult to maintain a unified security posture. This complexity increases the risk of misconfiguration and blind spots that attackers can exploit.</p>



<p class="has-small-font-size"><strong>4. What types of organizations benefit most from cyberstorage &#8211; and specifically security posture management?</strong></p>



<p class="has-small-font-size">Cyberstorage and storage security posture management are especially valuable for:</p>



<ul class="wp-block-list">
<li class="has-small-font-size">Large enterprises</li>



<li class="has-small-font-size">Organizations with multivendor or hybrid storage environments</li>



<li class="has-small-font-size">Regulated industries with strict recovery and compliance requirements</li>



<li class="has-small-font-size">Businesses reliant on uninterrupted access to critical data</li>
</ul>



<p></p>
<p>The post <a href="https://www.core6.com/blog/cyberstorage-comes-of-age-why-security-posture-management-is-critical-for-storage-and-backup/">Cyberstorage Comes of Age: Why Security Posture Management Is Now Critical for Storage &amp; Backup</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI-Powered Security for Storage &#038; Backup: Introducing the StorageGuard MCP Server</title>
		<link>https://www.core6.com/blog/ai-security-for-storage-and-backup-systems-storageguard-mcp/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 15:22:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/ai-has-changed-the-rules-of-cyber-defense-how-to-respond-2/</guid>

					<description><![CDATA[<p>We’re excited to announce the StorageGuard Model Context Protocol (MCP) Server &#8211; a powerful new way to manage and automate the security posture of enterprise storage</p>
<p>The post <a href="https://www.core6.com/blog/ai-security-for-storage-and-backup-systems-storageguard-mcp/">AI-Powered Security for Storage &amp; Backup: Introducing the StorageGuard MCP Server</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We’re excited to announce the <strong>StorageGuard <em>Model Context Protocol (MCP) </em>Server</strong> &#8211; a powerful new way to manage and automate the security posture of enterprise storage and backup systems using AI assistants such as ChatGPT, Copilot, Gemini or Claude.</p>



<p class="has-medium-font-size"><strong>AI-Powered Security Operations for Storage &amp; Backup</strong></p>



<p>Imagine prompting your favorite AI tool to:</p>



<ul class="wp-block-list">
<li>&#8220;List all administrator user accounts and groups on my NY-based storage systems&#8221;</li>



<li>&#8220;Remediate incorrect session-limit settings on my backup appliances&#8221;</li>



<li>&#8220;Check whether my storage systems comply with the proposed 2025 HIPAA regulation updates&#8221;</li>



<li>&#8220;Determine whether my backup system is vulnerable to CVE-2025-3928&#8221;</li>



<li>&#8220;Identify which hardening guidelines are still missing on my NAS platforms&#8221;</li>
</ul>



<p>By connecting your AI environment to the StorageGuard MCP Server, teams can query configurations, investigate findings, generate reports, and validate compliance—all through natural language. This dramatically reduces the learning curve and streamlines IT hardening, security operations, and audit-related tasks.</p>



<p class="has-medium-font-size"><strong>What’s Next: Cross-Layer Intelligence With MCP</strong></p>



<p>The real power of MCP emerges when your AI application can access multiple MCP-enabled systems &#8211; <a href="https://www.core6.com/storageguard/">StorageGuard</a> alongside platforms such as ServiceNow, Varonis, Check Point, Netwrix, and others.</p>



<p>Correlating insights across these layers unlocks new possibilities:</p>



<ul class="wp-block-list">
<li><strong>Advanced risk-based vulnerability prioritization</strong> using layered-defense analysis and attack-path insights</li>



<li><strong>Streamlined compliance reporting</strong> by bringing data-classification context into Storage and Backup posture assessments</li>



<li><strong>Business-aware remediation</strong> by attaching business-unit, service, and application context to Storage and Backup environments</li>
</ul>



<p>This cross-layer intelligence drives faster, more accurate decisions and elevates both security and operational efficiency.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="996" height="2006" src="https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2.png" alt="" class="wp-image-13740" style="aspect-ratio:0.5467523197715917;width:363px;height:auto" srcset="https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2.png 996w, https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2-149x300.png 149w, https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2-508x1024.png 508w, https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2-74x150.png 74w, https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2-768x1547.png 768w, https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2-763x1536.png 763w" sizes="(max-width: 996px) 100vw, 996px" /></figure>



<figure class="wp-block-image size-large"><a href="https://www.youtube.com/watch?v=2cERfSGApr0" target="_blank" rel=" noreferrer noopener"><img decoding="async" width="1024" height="256" src="https://www.core6.com/wp-content/uploads/2025/12/Banner-10-1024x256.png" alt="" class="wp-image-13579" srcset="https://www.core6.com/wp-content/uploads/2025/12/Banner-10-1024x256.png 1024w, https://www.core6.com/wp-content/uploads/2025/12/Banner-10-300x75.png 300w, https://www.core6.com/wp-content/uploads/2025/12/Banner-10-150x38.png 150w, https://www.core6.com/wp-content/uploads/2025/12/Banner-10-768x192.png 768w, https://www.core6.com/wp-content/uploads/2025/12/Banner-10-1536x384.png 1536w, https://www.core6.com/wp-content/uploads/2025/12/Banner-10-2048x512.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="has-medium-font-size"><strong>Availability</strong></p>



<p>The StorageGuard MCP Server is currently offered in limited-availability beta as part of the <a href="https://www.core6.com/pricing/"><em>StorageGuard Enterprise + AI</em> edition</a>.</p>



<p class="has-medium-font-size">If you’d like to learn more or explore what MCP can enable for your environment, <strong><a href="https://www.core6.com/talk-to-an-expert/">contact us today!</a></strong></p>



<p class="has-small-font-size"></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p style="font-size:15px"><strong>Frequently Asked Questions (FAQ)</strong></p>



<h3 class="wp-block-heading has-small-font-size"><strong>1. Why do AI-driven threats require a new cyber defense strategy?</strong></h3>



<p class="has-small-font-size">AI empowers attackers to instantly map environments, detect misconfigurations, and launch targeted exploits at machine speed, far beyond traditional manual reconnaissance approaches. This renders periodic security checks insufficient and demands continuous security posture management.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>2. What makes data infrastructure such a critical target for AI-powered attacks?</strong></h3>



<p class="has-small-font-size">Data infrastructure — especially storage and backup systems — houses sensitive workloads and cyber-recovery capabilities. AI can quickly identify subtle vulnerabilities in these systems, making compromise catastrophic without proactive defense.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>3. How does automated remediation improve cyber defenses?</strong></h3>



<p class="has-small-font-size">Automated remediation — such as StorageGuard’s <em>Fix It</em> capability &#8211; allows organizations to correct security misconfigurations automatically, reducing exposure windows and scaling security without proportionally increasing headcount.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>4. How does StorageGuard help organizations defend against AI-driven cyber threats?</strong></h3>



<p class="has-small-font-size">By connecting our customers&#8217; AI environments to the&nbsp;StorageGuard MCP Server, teams can inspect and harden security configurations, investigate and resolve weaknesses, and validate compliance &#8211; all through natural language.</p>



<p></p>
<p>The post <a href="https://www.core6.com/blog/ai-security-for-storage-and-backup-systems-storageguard-mcp/">AI-Powered Security for Storage &amp; Backup: Introducing the StorageGuard MCP Server</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing AI Storage: How StorageGuard Hardens NVIDIA‑Accelerated VAST Data Environments</title>
		<link>https://www.core6.com/blog/securing-ai-storage-how-storageguard-hardens-nvidia-accelerated-vast-data/</link>
		
		<dc:creator><![CDATA[Doron Pinhas]]></dc:creator>
		<pubDate>Sun, 08 Mar 2026 11:44:13 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience-2/</guid>

					<description><![CDATA[<p>AI is only as trustworthy as the data plane that feeds it. As enterprises modernize for agentic systems and multimodal workloads, storage becomes part of the</p>
<p>The post <a href="https://www.core6.com/blog/securing-ai-storage-how-storageguard-hardens-nvidia-accelerated-vast-data/">Securing AI Storage: How StorageGuard Hardens NVIDIA‑Accelerated VAST Data Environments</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>AI is only as trustworthy as the data plane that feeds it. As enterprises modernize for agentic systems and multimodal workloads, storage becomes part of the compute fabric—especially with NVIDIA‑accelerated designs that bring GPUs to where data already lives on VAST Data.</p>



<p><a href="https://www.vastdata.com/resources/solution-briefs/cnode-x-accelerated-computing-platform">VAST’s CNode‑X</a> integrates <a href="https://www.nvidia.com/en-eu/products/workstations/professional-desktop-gpus/rtx-pro-6000-family/">NVIDIA RTX Pro 6000 Blackwell GPUs</a> with the VAST EBox data platform to deliver a fully accelerated AI data stack for vector search, GPU‑native SQL, and containerized model orchestration—bringing AI to your data rather than moving data to AI.</p>



<p>That convergence raises the security bar. When storage, vector indices, and AI runtimes share one fabric, misconfigurations become attack surfaces that threaten data security, integrity, model safety, and compliance. </p>



<p><a href="https://www.core6.com/storageguard/">StorageGuard</a>, a Security Posture Management Solution for storage and backup systems, addresses this by continuously identifying security misconfigurations, compliance issues, vulnerabilities and configuration drift, and driving remediation &#8211; purpose‑built for VAST environments.</p>



<p class="has-medium-font-size"><strong>Why AI Storage Needs a New Security Posture</strong></p>



<p>VAST’s disaggregated, shared‑everything (DASE) architecture provides every CNode direct NVMe‑oF access to all data while managed Kubernetes schedules GPU workloads alongside data services. This delivers high throughput for RAG, vector search, and multimodal analytics &#8211; but it also demands consistent security best practices for identity, encryption, auditing, and network hygiene across the full fabric.</p>



<p><a href="https://www.vastdata.com/resources/white-papers/vast-data-platform-security-configuration-guide">VAST’s Security Configuration Guide</a> offers robust primitives &#8211; ABAC, immutable auditing, TLS 1.3 for management, FIPS‑validated crypto for data in flight/at rest, external KMS, and STIG‑aligned hardening. </p>



<p>The challenge in the field is ensuring these, and other organizational controls are configured correctly everywhere, continuously, and don’t drift across tenants, views, protocols (NFS/SMB/S3), and rapidly expanding AI services.</p>



<p class="has-medium-font-size"><strong>StorageGuard for VAST + NVIDIA: <em>Security Posture Management for AI Storage</em></strong></p>



<p>StorageGuard establishes a Hardened Configuration Baseline, composed of the VAST hardening guidelines, industry standards and cybersecurity frameworks, and then automatically identifies security misconfigurations and drifts from the target baseline.</p>



<p>Below are examples of high-impact controls StorageGuard continuously validates in VAST environments that host NVIDIA-accelerated AI workloads. StorageGuard ensures these target baseline controls are effectively deployed across the VAST Data environment and do not drift over time.</p>



<p><strong>1) Identity, Roles, and Least Privilege (Zero‑Trust in practice)</strong></p>



<ul class="wp-block-list">
<li>Federation to enterprise IdPs (AD/LDAP/SAML) with MFA for admin access</li>



<li>Secure LDAP bindings (LDAPS/StartTLS), lockout thresholds, idle timeouts, API token limits</li>



<li>Detection of unapproved local users and restriction of break‑glass accounts to emergency use with strong rotation</li>



<li>Permissions are consistent and minimal</li>
</ul>



<p><strong>2) Encryption In‑Flight and At‑Rest (with EKM assurance)</strong></p>



<ul class="wp-block-list">
<li>TLS 1.3 enforced for VMS/CLI/SSH, protocol endpoints, replication, and S3</li>



<li>AES‑XTS 256‑bit encryption at rest enabled; KMIP connectivity to approved external KMS with valid CA and expiry tracking</li>



<li>Per‑path encryption for sensitive AI datasets used by agents or training</li>
</ul>



<p><strong>3) Auditing &amp; Forensics for AI Pipelines</strong></p>



<ul class="wp-block-list">
<li>Global admin/system/protocol audit enabled with role‑based read access and retention aligned to policy</li>



<li>Protocol audit on for NFS/SMB/S3 used by training, RAG ingestion, and vector stores</li>



<li>Redundant NTP configured to preserve chain‑of‑custody</li>
</ul>



<p><strong>4) Network &amp; Service Surface Reduction</strong></p>



<ul class="wp-block-list">
<li>Removal of unused NFS/SMB/S3 endpoints</li>



<li>Remote support and call‑home configuration with SSL verification and enforced TLS level</li>



<li>API/Web exposure controls (e.g., CORS) reviewed and restricted</li>
</ul>



<p><strong>5) S3/Object Controls for RAG &amp; Vector</strong></p>



<ul class="wp-block-list">
<li>Anonymous access disabled, bucket versioning enabled, TLS‑only endpoints</li>



<li>Secure replication for DR to prevent tampering or rollback of embeddings and training sets</li>
</ul>



<p><strong>6) NFS/SMB Guardrails for GPU Data Paths (POSIX)</strong></p>



<ul class="wp-block-list">
<li>NFS rootsquash enforced, NFSv4.2 preferred, export ACLs follow least privilege</li>



<li>Client IP ACLs scoped to GPU nodes and orchestrators only</li>



<li>SMB access aligned to AD group policy with secure LDAP bindings and lockout thresholds</li>
</ul>



<p><strong>7) Control‑Plane Hygiene at AI Scale</strong></p>



<ul class="wp-block-list">
<li>Approved DNS/NTP/Syslog/SMTP endpoints with redundancy</li>



<li>KMS locality and redundancy to prevent key‑availability issues that can stall GPU jobs mid‑pipeline</li>



<li>TLS level enforcement across control‑plane services</li>
</ul>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="341" data-id="13770" src="https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-1024x341.png" alt="" class="wp-image-13770" srcset="https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-1024x341.png 1024w, https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-300x100.png 300w, https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-150x50.png 150w, https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-768x256.png 768w, https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-1536x512.png 1536w, https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-2048x683.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
</figure>



<p class="has-medium-font-size"><strong>How StorageGuard Works for VAST Data</strong></p>



<p><strong>Discover</strong><br><a href="https://www.core6.com/storageguard/">StorageGuard</a> connects to the VAST VMS API with least‑privilege service accounts. It enumerates tenants, views, buckets, protocols, and security posture. And it collects effective configuration for identity, encryption, audit, and networking &#8211; no agents on GPU nodes.</p>



<p><strong>Continuously Validate</strong><br>Runs configuration checks against a selected configuration baseline policy to enforce security best practices &#8211; including TLS ciphers, ABAC permissions, MFA/SSO posture, KMS trust chains, protocol hardening, and replication security.</p>



<p><strong>Prioritize &amp; Remediate</strong><br>Surfaces issues that create risk to AI workflows, mapped to Industry Standards (e.g. NIST, CIS, NERC CIP, HIPAA, DORA, NIS2, FFIEC, CRI, CISA and more). Applies hardening guidelines with either guided or automated remediation.</p>



<p><strong>Example: <em>Securing a RAG Pipeline on VAST + NVIDIA</em></strong></p>



<ol start="1" class="wp-block-list">
<li>Data ingestion lands unstructured files and PDFs into a VAST tenant; StorageGuard verifies encryption is enabled, key management method, CA, and cert expiry.</li>



<li>Embedding jobs run on NVIDIA GPUs via CNode-X; StorageGuard confirms NFS exports are scoped to GPU nodes only, with root squash and NFSv4.2.</li>



<li>Vector index persists as objects; StorageGuard ensures S3 anonymous access is disabled, versioning on, and TLS‑only replication to DR.</li>
</ol>



<p><strong>The outcome:</strong> <em>GPU pipelines stay fast and compliant, with continuous evidence that storage controls match your AI risk tolerance.</em></p>



<p class="has-medium-font-size"><strong>Why This Matters for NVIDIA-Accelerated AI</strong></p>



<p>The CNode-X approach collapses the gap between data and compute, allowing NVIDIA-accelerated vector search, SQL, and model services to run <em>in place</em> with the data. It’s a massive performance and productivity win—but it also means storage security = AI security. With StorageGuard, security teams gain continuous, evidence-driven assurance that the VAST Data platform underpinning their AI is encrypted, least-privileged, audited, and network-hardened—without slowing down GPUs or developer velocity.</p>



<p class="has-medium-font-size"><strong>Getting Started</strong></p>



<ul class="wp-block-list">
<li>Pilot StorageGuard on a VAST tenant hosting AI data</li>



<li>Choose a built-in hardened configuration baseline policy that meets you needs</li>



<li>Run an initial baseline assessment, and review P1 findings</li>



<li>Connect to ITSM (e.g. <a href="https://www.servicenow.com/">ServiceNow</a>, <a href="https://www.bmc.com/">BMC</a>, etc.) to track security misconfigurations and configuration drift, as well as streamline remediation</li>
</ul>



<p>AI is redefining the data plane. With StorageGuard, you can adopt NVIDIA‑accelerated VAST architectures confidently.</p>



<p>Discover the <strong>Recommended Security Baseline Checks for VAST Data Clusters</strong>: <a href="https://support.core6.com/hc/en-us/articles/25852419079196-VAST-Data-Clusters-Recommended-Security-Baseline-Checks" target="_blank" rel="noreferrer noopener">https://support.core6.com/hc/en-us/articles/25852419079196-VAST-Data-Clusters-Recommended-Security-Baseline-Checks</a></p>



<p><strong><a href="https://www.core6.com/contact"><strong>Contact us</strong></a><strong> to learn more about StorageGuard for AI Storage</strong></strong></p>



<p>_____________________________________________________</p>



<p><strong>Frequently Asked Questions (FAQ)</strong></p>



<p class="has-small-font-size"><strong>1. What is AI storage, and why does it need a hardened security posture?</strong></p>



<p class="has-small-font-size">AI storage refers to the data plane that feeds AI pipelines &#8211; training datasets, vector indices, embeddings, model artifacts, and unstructured content for RAG. </p>



<p class="has-small-font-size">Because modern AI architectures (like VAST Data + NVIDIA) collapse storage, compute, and orchestration into the same fabric, any storage misconfiguration becomes a security, integrity, and model‑safety risk. Hardened storage ensures data confidentiality, integrity, availability, and compliance for high‑value AI workloads.</p>



<p class="has-small-font-size"><strong>2. Why are NVIDIA‑accelerated VAST Data systems uniquely sensitive to misconfiguration?</strong></p>



<p class="has-small-font-size">VAST’s DASE architecture gives every CNode direct NVMe‑oF access to all data, while Kubernetes schedules GPU workloads next to storage services. This convergence creates high‑performance but tightly coupled environments where:</p>



<ul class="wp-block-list">
<li class="has-small-font-size">Identity and access gaps can escalate quickly</li>



<li class="has-small-font-size">Misconfigured S3/NFS/SMB endpoints become exposed attack surfaces</li>



<li class="has-small-font-size">Weak encryption or incorrect KMS trust chains threaten model safety</li>



<li class="has-small-font-size">Drift can break compliance controls across tenants and protocols</li>



<li class="has-small-font-size">As a result, storage misconfigurations directly affect AI runtime security.</li>
</ul>



<p class="has-small-font-size"><strong>3. What security challenges do enterprises face when running AI workloads on VAST Data?</strong><br></p>



<p class="has-small-font-size">Common challenges include:</p>



<ul class="wp-block-list">
<li class="has-small-font-size">Inconsistent identity and RBAC across tenants and protocols</li>



<li class="has-small-font-size">Unencrypted data paths between GPUs and storage</li>



<li class="has-small-font-size">Missing or incomplete audit logs used for AI forensics</li>



<li class="has-small-font-size">Unused or exposed endpoints (NFS, SMB, S3) expanding attack surface</li>



<li class="has-small-font-size">Versioning or replication gaps for RAG/vector data integrity</li>



<li class="has-small-font-size">Configuration drift as AI services scale out</li>
</ul>



<p class="has-small-font-size"><em>Enterprises need continuous validation, not a one‑time setup.</em></p>



<p class="has-small-font-size"><strong>4. How does StorageGuard help secure NVIDIA‑accelerated VAST environments?</strong></p>



<p class="has-small-font-size">StorageGuard provides <strong><a href="https://www.core6.com/storageguard/">Storage Security Posture Management (SSPM)</a></strong> purpose‑built for VAST by:</p>



<ul class="wp-block-list">
<li class="has-small-font-size">Establishing a hardened configuration baseline using VAST hardening guides + industry frameworks</li>



<li class="has-small-font-size">Continuously detecting misconfigurations, vulnerabilities, compliance gaps, and drift</li>



<li class="has-small-font-size">Prioritizing issues by severity and aligning them to standards (CIS, NIST, NERC CIP, HIPAA, DORA, NIS2, etc.)</li>



<li class="has-small-font-size">Guiding or automating safe remediation</li>



<li class="has-small-font-size">This ensures VAST environments stay secure, compliant, and GPU‑ready.</li>
</ul>



<p></p>
<p>The post <a href="https://www.core6.com/blog/securing-ai-storage-how-storageguard-hardens-nvidia-accelerated-vast-data/">Securing AI Storage: How StorageGuard Hardens NVIDIA‑Accelerated VAST Data Environments</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Closing ASCA’s Biggest Gap: Storage and Backup Hardening</title>
		<link>https://www.core6.com/blog/closing-gartner-automated-security-control-assessment-biggest-gap-storage-and-backup/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 13:18:27 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/what-security-leaders-need-to-know-about-iso27040-storage-backup-security-2/</guid>

					<description><![CDATA[<p>Storage and Backup Are the Missing Piece in ASCA Security teams continue to invest in advanced controls, yet incidents persist. Gartner identifies the root cause clearly:</p>
<p>The post <a href="https://www.core6.com/blog/closing-gartner-automated-security-control-assessment-biggest-gap-storage-and-backup/">Closing ASCA’s Biggest Gap: Storage and Backup Hardening</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-medium-font-size"><strong>Storage and Backup Are the Missing Piece in ASCA</strong></p>



<p>Security teams continue to invest in advanced controls, yet incidents persist. Gartner identifies the root cause clearly: controls exist, but they are misconfigured, drifting from baseline, or poorly optimized. To address this, <a href="https://www.gartner.com/en">Gartner</a> introduced <strong>Automated Security Control Assessment (ASCA)</strong> &#8211; a technology category designed to continuously assess, prioritize, and optimize security controls to reduce exposure.</p>



<p>ASCA is becoming foundational to modern security programs. But most implementations overlook a critical domain.</p>



<p class="has-medium-font-size"><strong>The Storage &amp; Backup Blind Spot</strong></p>



<p>Storage and backup systems hold an organization’s most critical asset—its data—and are increasingly targeted by ransomware and extortion attacks. Compromising recovery infrastructure is often what forces ransom payment.</p>



<p>Yet storage and backup controls are typically:</p>



<ul class="wp-block-list">
<li>Assessed manually and infrequently</li>



<li>Highly vendor‑specific and complex</li>



<li>Outside the scope of traditional vulnerability, endpoint, or cloud security tools</li>
</ul>



<p>This creates a dangerous gap: organizations believe controls are in place, while misconfigurations and drift silently increase exposure.</p>



<p>Gartner highlights configuration drift, weak defaults, and misaligned coverage as persistent drivers of breaches—problems that cannot be solved without automation.</p>



<p class="has-medium-font-size"><strong>ASCA Requires Domain‑Specific Intelligence</strong></p>



<p>Gartner defines ASCA as agentless, API‑driven technology that continuously evaluates control configurations, maps them to frameworks and best practices, and supports prioritized remediation.</p>



<p>However, generic ASCA platforms lack the deep domain knowledge required for storage and backup environments, including:</p>



<ul class="wp-block-list">
<li>Vendor‑specific hardening guidance</li>



<li>Ransomware protection and recovery controls</li>



<li>Snapshot, replication, and immutability settings</li>



<li>Compliance interpretation for data infrastructure</li>
</ul>



<p>Without this depth, storage and backup remain outside continuous control assessment.</p>



<p class="has-medium-font-size"><strong>StorageGuard: ASCA for Storage and Backup</strong></p>



<p><strong><a href="https://www.core6.com/storageguard/">StorageGuard</a></strong> applies ASCA principles specifically to enterprise storage and backup systems.</p>



<p>Using authenticated, read‑only access, StorageGuard continuously collects configuration data and validates it against:</p>



<ul class="wp-block-list">
<li>Vendor security and hardening best practices</li>



<li>Industry and regulatory standards (NIST, ISO, CIS, DORA, and others)</li>



<li>Ransomware protection and recovery guidelines</li>



<li>Organizational security baselines</li>
</ul>



<p>This directly aligns with Gartner’s ASCA definition: continuous assessment, baseline drift detection, and prioritized remediation—delivered through automation rather than periodic audits or scripts.</p>



<p class="has-medium-font-size"><strong>From Findings to Real Risk Reduction</strong></p>



<p>Gartner emphasizes that ASCA adds control context, enabling better prioritization and faster mitigation—not just more findings.</p>



<p>For storage and backup, StorageGuard provides that context by:</p>



<ul class="wp-block-list">
<li>Identifying misconfigurations that weaken recovery</li>



<li>Detecting drift from approved baselines</li>



<li>Highlighting exposure to vendor advisories and missing updates</li>



<li>Delivering actionable, platform‑specific remediation guidance</li>
</ul>



<p>The result is fewer blind spots and greater confidence that data infrastructure can withstand modern attacks.</p>



<p class="has-medium-font-size"><strong>Closing the ASCA Gap</strong></p>



<p>ASCA adoption is accelerating as organizations struggle with security control complexity at scale. But any ASCA strategy that ignores storage and backup leaves a critical gap—exactly where attackers focus.</p>



<p><strong><a href="https://www.core6.com/storageguard/">StorageGuard</a> closes that gap, extending automated security control assessment to the systems that ultimately determine whether an organization can recover.</strong></p>



<p></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p class="has-medium-font-size"><strong>Frequently Asked Questions (FAQs)</strong></p>



<h3 class="wp-block-heading has-small-font-size">What is Automated Security Control Assessment (ASCA)?</h3>



<p class="has-small-font-size">ASCA is a Gartner-defined technology that continuously evaluates security control configurations, detects drift from approved baselines, and prioritizes remediation using automated, agentless, API-driven assessments.</p>



<h3 class="wp-block-heading has-small-font-size">What major gap exists in most ASCA implementations?</h3>



<p class="has-small-font-size">Most ASCA platforms overlook storage and backup systems. These systems contain an organization’s most critical data and are often targeted by ransomware, yet they are rarely included in continuous control assessments.</p>



<h3 class="wp-block-heading has-small-font-size">Why are storage and backup systems hard to assess with generic ASCA tools?</h3>



<p class="has-small-font-size">Storage and backup technologies require deep vendor-specific knowledge, unique hardening guidance, and specialized recovery controls that generic ASCA platforms cannot interpret or validate.</p>



<h3 class="wp-block-heading has-small-font-size">How does StorageGuard apply ASCA principles to storage and backup systems?</h3>



<p class="has-small-font-size"><a href="https://www.core6.com/storageguard/">StorageGuard</a> uses authenticated, read‑only API access to continuously collect configuration data and validate it against vendor best practices, industry standards, ransomware recovery guidance, and organizational baselines.</p>



<p></p>
<p>The post <a href="https://www.core6.com/blog/closing-gartner-automated-security-control-assessment-biggest-gap-storage-and-backup/">Closing ASCA’s Biggest Gap: Storage and Backup Hardening</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lessons from CISOs &#8211; 2026 Infrastructure Security Outlook</title>
		<link>https://www.core6.com/blog/lessons-from-cisos-2026-infrastructure-security-outlook/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Tue, 10 Feb 2026 12:44:01 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations-2/</guid>

					<description><![CDATA[<p>Infrastructure security is undergoing the most significant transformation in decades. Once viewed as the quiet, foundational layer beneath applications and endpoints, today it has moved to</p>
<p>The post <a href="https://www.core6.com/blog/lessons-from-cisos-2026-infrastructure-security-outlook/">Lessons from CISOs &#8211; 2026 Infrastructure Security Outlook</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Infrastructure security is undergoing the most significant transformation in decades. Once viewed as the quiet, foundational layer beneath applications and endpoints, today it has moved to the center of how global enterprises operate, scale, and defend themselves.</p>



<p>This <strong><em>CISO Point of View</em></strong> article offers a curated, abridged view of our full Infrastructure Security Guide, featuring insights from leading CISOs on how enterprises are redefining infrastructure security in 2026. <strong>To read the full Guide, <u><a href="https://www.core6.com/resources/ciso-point-of-view-guide-the-2026-infrastructure-security-outlook/" type="link" id="https://www.core6.com/resources/ciso-point-of-view-guide-the-2026-infrastructure-security-outlook/" target="_blank" rel="noreferrer noopener">click here</a></u></strong>.</p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-full"><img decoding="async" width="816" height="829" data-id="13691" src="https://www.core6.com/wp-content/uploads/2026/02/ciso.png" alt="" class="wp-image-13691" srcset="https://www.core6.com/wp-content/uploads/2026/02/ciso.png 816w, https://www.core6.com/wp-content/uploads/2026/02/ciso-295x300.png 295w, https://www.core6.com/wp-content/uploads/2026/02/ciso-148x150.png 148w, https://www.core6.com/wp-content/uploads/2026/02/ciso-768x780.png 768w" sizes="(max-width: 816px) 100vw, 816px" /></figure>
</figure>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">Section 1: Framing the Conversation — The Role of Infrastructure Security</h2>



<p class="has-medium-font-size"><strong>How do you balance investment between traditional security domains (like endpoint or application security) and infrastructure protection?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="156" class="wp-image-13692" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/mark2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/mark2.png 329w, https://www.core6.com/wp-content/uploads/2026/02/mark2-288x300.png 288w, https://www.core6.com/wp-content/uploads/2026/02/mark2-144x150.png 144w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Mark Thomson</strong><br>Deputy Group CISO<br><strong>Howden</strong></td><td class="has-text-align-left" data-align="left"><em>“Conduct thorough risk assessments to identify critical assets and vulnerabilities, ensuring resources are directed where they mitigate the greatest impact. For instance, businesses heavily reliant on cloud services may prioritize infrastructure segmentation and identity controls over endpoint hardening.</em><br><em> </em><br><em>Internal strategies and frameworks such as ISO 27001 and PCI-DSS reinforce this alignment by linking controls to business objectives and compliance requirements.</em><br><em> </em><br><em>Beyond prioritization, investment needs to be balanced between prevention, detection, and response across endpoint, application, and infrastructure security.</em></td></tr></tbody></table></figure>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">Section 2: Real-World Priorities &amp; Challenges</h2>



<p class="has-medium-font-size"><strong>As infrastructure becomes increasingly hybrid and distributed, what are the biggest visibility or control challenges you face?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="154" class="wp-image-13698" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/Gernette2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/Gernette2.png 278w, https://www.core6.com/wp-content/uploads/2026/02/Gernette2-146x150.png 146w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Gernette Wright</strong><br>Former IT Security Officer &#8211; Americas<br><strong>Schneider Electric</strong></td><td><em>“Without a doubt, it’s about knowing where data is and who can access it. When you combine on-premises systems, multiple clouds, SaaS platforms, and older systems, it becomes hard to keep track.</em><br><em> </em><br><em>Access control gets trickier because each platform handles permissions differently. This opens the door for privilege creep. When teams rush or do not follow proper procedures, over-provisioning often results.”</em><br><em> </em><br><em>Another important aspect is knowing where the data came from, how it has changed, who worked with it, and whether the right permissions were in place at each step.</em><br><em> </em><br><em>Without this traceability, accountability becomes unclear. It also increases security risks because sensitive information can unintentionally end up in systems not meant to store it.”</em></td></tr></tbody></table></figure>



<p class="has-medium-font-size"><strong>How do you ensure IT teams and security teams stay aligned on priorities and accountability?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="150" class="wp-image-13700" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/Rick2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/Rick2.png 295w, https://www.core6.com/wp-content/uploads/2026/02/Rick2-150x150.png 150w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Rick Doten</strong><br>Former VP Information Security<br><strong>Centene</strong></td><td><em>“Priorities are easy, make sure that which is critical to the business is protected, resilient, and stable. We spend too much time chasing the priorities given by the tools or CVE scores without understanding business context and impact.</em><br><em> </em><br><em>We have only statically evolved our prioritization based on external facing, or known exploit. But even that might not matter to the business, based on the specific platform.”</em></td></tr></tbody></table></figure>



<p></p>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">Section 3: Modernization &amp; Transformation</h2>



<p class="has-medium-font-size"><strong>Are traditional infrastructure security models still relevant — or do we need a new operating model for the modern enterprise?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="150" class="wp-image-13699" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/Erdal2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/Erdal2.png 296w, https://www.core6.com/wp-content/uploads/2026/02/Erdal2-150x150.png 150w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Erdal Ozkaya</strong><br>CISO<br><strong>Morgan State University</strong></td><td><em>“The old &#8216;Castle and Moat&#8217; model? It’s gone. It’s comfortable to think, &#8216;If I secure the perimeter, the inside is safe,&#8217; but it’s a lie.</em><br><em> </em><br><em>We operate on Zero Trust now, which sounds like a buzzword, but it’s actually a mindset shift. It means I treat my internal corporate network with the same suspicion I treat the open internet. It’s paranoid, sure, but in this job, paranoia is a virtue. We assume the bad guy is already inside.”</em></td></tr></tbody></table></figure>



<p class="has-medium-font-size"><strong>How do you approach securing “invisible infrastructure” — the underlying systems that run across hybrid cloud, APIs, and automation pipelines?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="150" class="wp-image-13697" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/Girish2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/Girish2.png 307w, https://www.core6.com/wp-content/uploads/2026/02/Girish2-300x300.png 300w, https://www.core6.com/wp-content/uploads/2026/02/Girish2-150x150.png 150w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Girish Kulkarni</strong><br>CISO<br><strong>Aurionpro</strong></td><td><em>“Invisible infrastructure requires security by design. This includes API security gateways and runtime protection, CI/CD pipeline hardening with secrets management, and Infrastructure-as-Code (IaC) scanning before deployment”</em></td></tr><tr><td><img decoding="async" width="150" height="150" class="wp-image-13694" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/matthew2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/matthew2.png 319w, https://www.core6.com/wp-content/uploads/2026/02/matthew2-300x300.png 300w, https://www.core6.com/wp-content/uploads/2026/02/matthew2-150x150.png 150w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Matthew Lang</strong><br>Former CISO<br><strong>State Employees&#8217; Credit Union (SECU)</strong></td><td><em>“As far as hidden IT outside the organization, you need extremely good contracts with all 3<sup>rd</sup> parties – including the right to scan for weaknesses.”</em></td></tr></tbody></table></figure>



<p></p>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">Section 4: Storage &amp; Backup — The Last Line of Defense</h2>



<p class="has-medium-font-size"><strong>Storage and backup systems are often overlooked but critical in cyber resilience. How do you ensure they’re properly secured?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="154" class="wp-image-13698" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/Gernette2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/Gernette2.png 278w, https://www.core6.com/wp-content/uploads/2026/02/Gernette2-146x150.png 146w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Gernette Wright</strong><br>Former IT Security Officer &#8211; Americas<br><strong>Schneider Electric</strong></td><td><em>“From my perspective, backup systems are arguably the most critical piece of your BCP and DR strategy. Outside of cost, there are two other critical areas I look for: immutability and speed of restoration.</em><br><em> </em><br><em>On the operational side, these backup systems must be tested. I ensure regular restorations are done quarterly and a full restore done annually of a critical system or systems.</em><br><em> </em><br><em>Storage security addresses the same fundamentals, encryption, access control, patching, and monitoring. It’s important to make sure the storage platform is properly secured through encryption, tight access control, patching, and monitoring, and that sensitive data isn’t being copied to locations that weren’t meant to hold it.”</em></td></tr><tr><td><img decoding="async" width="150" height="150" class="wp-image-13695" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/bob2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/bob2.png 344w, https://www.core6.com/wp-content/uploads/2026/02/bob2-300x300.png 300w, https://www.core6.com/wp-content/uploads/2026/02/bob2-150x150.png 150w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Bob Turner</strong><br>Former CISO<br><strong>Penn State University </strong>and <strong>University of Wisconsin-Madison </strong></td><td><em>“To think about the future, you have to go back to basics: where is your information actually kept?</em><br><em> </em><br><em>Your primary data lives in central storage systems that people use to do business. Today, backup systems are also often kept online in some form, which can be risky.</em><br><em> </em><br><em>Any primary data source that is critical to the enterprise needs either an offline backup or a very well-isolated backup.</em><br><em> </em><br><em>Enterprises that are doing this well aren’t usually talking about it publicly, but they’re quietly adopting the best security controls the industry can provide. If you’re not there yet, that’s where you need to be heading.”</em></td></tr></tbody></table></figure>



<p class="has-medium-font-size"><strong>Do you see a growing convergence between <em>infrastructure reliability</em> and <em>cybersecurity</em> — especially when it comes to data protection and recovery?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="156" class="wp-image-13692" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/mark2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/mark2.png 329w, https://www.core6.com/wp-content/uploads/2026/02/mark2-288x300.png 288w, https://www.core6.com/wp-content/uploads/2026/02/mark2-144x150.png 144w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Mark Thomson</strong><br>Deputy Group CISO<br><strong>Howden</strong></td><td><em>“There is certainly an increasing convergence between infrastructure reliability and cybersecurity, particularly in data protection and recovery.</em><br><em> </em><br><em>Traditionally, disaster recovery focused on physical resilience while cybersecurity addressed digital threats, but today these domains intersect as cyberattacks can disrupt critical infrastructure as severely as natural disasters.</em><br><em> </em><br><em>Organizations need to embed cybersecurity into resilience frameworks, aligning backup strategies with business continuity plans, and leveraging technologies such as Zero Trust and cyber-resilient storage to ensure operational continuity under attack conditions.”</em></td></tr><tr><td><img decoding="async" width="150" height="150" class="wp-image-13697" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/Girish2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/Girish2.png 307w, https://www.core6.com/wp-content/uploads/2026/02/Girish2-300x300.png 300w, https://www.core6.com/wp-content/uploads/2026/02/Girish2-150x150.png 150w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Girish Kulkarni</strong><br>CISO<br><strong>Aurionpro</strong></td><td><em>“Absolutely. Cybersecurity and reliability are now inseparable. Ransomware has made <strong>backup integrity a security priority</strong>.</em><br><em> </em><br><em>We integrate <strong>cyber resilience metrics</strong> into business continuity planning.”</em></td></tr></tbody></table></figure>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">Section 5: Looking Ahead — Future of Infrastructure Security</h2>



<p class="has-medium-font-size"><strong>What new trends or technologies do you think will most impact Infrastructure Security in the next 2–3 years?</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><img decoding="async" width="150" height="150" class="wp-image-13693" style="width: 150px;" src="https://www.core6.com/wp-content/uploads/2026/02/mats2.png" alt="" srcset="https://www.core6.com/wp-content/uploads/2026/02/mats2.png 344w, https://www.core6.com/wp-content/uploads/2026/02/mats2-300x300.png 300w, https://www.core6.com/wp-content/uploads/2026/02/mats2-150x150.png 150w" sizes="(max-width: 150px) 100vw, 150px" /><br><strong>Mats Nygren</strong><br>Former VP Information Security<br><strong>U.S. Bank</strong></td><td><em>“Resilience will be regulated and require measurability –disclosure requirements and market pressure will make resiliency a board-level expectation.</em><br><em> </em><br><em>Recovery time, identity hygiene, and cloud posture drift will become quantitative indicators of infrastructure security maturity.</em><br><strong><em> </em></strong><br><em>Infrastructure security will be judged not only on how well it prevents incidents, but how well it recovers from them, in addition to driving value for the business.”</em></td></tr></tbody></table></figure>



<p></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-medium-font-size"><strong><strong><u><a href="https://www.core6.com/resources/ciso-point-of-view-guide-the-2026-infrastructure-security-outlook/" type="link" id="https://www.core6.com/resources/ciso-point-of-view-guide-the-2026-infrastructure-security-outlook/" target="_blank" rel="noreferrer noopener">Click here</a></u> to read the full CISO Point of View Guide</strong></strong></p>



<p></p>
<p>The post <a href="https://www.core6.com/blog/lessons-from-cisos-2026-infrastructure-security-outlook/">Lessons from CISOs &#8211; 2026 Infrastructure Security Outlook</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Security Leaders Need to Know About ISO27040 – Storage &#038; Backup Security</title>
		<link>https://www.core6.com/blog/what-security-leaders-need-to-know-about-iso27040-storage-backup-security/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Mon, 19 Jan 2026 14:19:17 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/ai-has-changed-the-rules-of-cyber-defense-how-to-respond-2/</guid>

					<description><![CDATA[<p>For years, enterprise security programs have focused heavily on endpoints, networks, and applications – while storage and backup systems quietly became one of the most attractive</p>
<p>The post <a href="https://www.core6.com/blog/what-security-leaders-need-to-know-about-iso27040-storage-backup-security/">What Security Leaders Need to Know About ISO27040 – Storage &amp; Backup Security</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-medium-font-size">For years, enterprise security programs have focused heavily on endpoints, networks, and applications – while storage and backup systems quietly became one of the most attractive attack surfaces in the environment. That gap is now impossible to ignore.</p>



<p>The release of&nbsp;<a href="https://www.iso.org/standard/80194.html" target="_blank" rel="noreferrer noopener"><strong>ISO/IEC 27040:2024 – Storage Security</strong></a>&nbsp;marks a pivotal moment for enterprises that care about cyber resilience and recoverability. It is the first truly comprehensive, globally recognized standard dedicated specifically to securing storage and backup systems – and its timing couldn’t be more critical.</p>



<p class="has-medium-font-size"><strong>Storage and Backup: The Last Line of Defense – and a Prime Target</strong></p>



<p>Attackers are exploiting the fact that storage and backup environments are often less monitored, less hardened, and poorly integrated into vulnerability management programs. In many organizations, storage &amp; backup systems still operate with legacy protocols, excessive privileges, weak authentication, and minimal logging – conditions that attackers actively seek out.</p>



<p>The consequences are severe: data theft, data destruction, operational disruption, regulatory exposure, and long-term reputational damage.</p>



<p class="has-medium-font-size"><strong>What Makes ISO/IEC 27040 Different – and Important</strong></p>



<p>ISO/IEC 27040:2024 is not a minor update. It is a major overhaul of the outdated 2015 edition, designed to reflect modern storage architectures, threat models, and regulatory expectations.</p>



<p><em>Key characteristics include:</em></p>



<ul class="wp-block-list">
<li>220 storage security guidelines, with 188 defined controls that establish a baseline for secure storage operations</li>



<li>A clear distinction between guidance and mandatory requirements, particularly around encryption, logging, access control, protocol hardening, and secure sanitization</li>



<li>Deep alignment with the broader ISO/IEC 27000 family, including ISO 27001 and ISO 27002, ensuring storage security is integrated into existing governance frameworks rather than treated as a side project</li>
</ul>



<p>Most importantly, ISO 27040 acknowledges that storage security drifts over time. Configuration changes, firmware upgrades, evolving vendor guidance, and newly discovered vulnerabilities all erode security posture unless continuously validated.</p>



<p class="has-medium-font-size"><strong>From Policy to Practice: What ISO 27040 Actually Requires</strong></p>



<p>Unlike high-level security frameworks, ISO 27040 goes deep into the technical realities of storage &amp; backup environments. It covers:</p>



<ul class="wp-block-list">
<li>Strong authentication and access control, including multi-factor authentication and separation of duties</li>



<li>Encryption requirements for data at rest and in motion, with minimum cryptographic strength</li>



<li>Protocol hardening, including secure configurations for NFS, SMB, iSCSI, Fibre Channel, NVMe, and object storage</li>



<li>Comprehensive logging and monitoring, with protected log retention</li>



<li>Immutability, snapshots, replication, and cyber-recovery backups, recognizing storage as the backbone of resilience</li>



<li>Vendor access restrictions and secure remote management</li>
</ul>



<p>These controls map directly to real-world attack techniques observed in recent storage and backup breaches &amp; ransomware incidents.</p>



<p class="has-medium-font-size"><strong>How StorageGuard helps you comply with ISO/IEC 27040</strong></p>



<p><strong><em>Required by ISO, Provided by StorageGuard</em></strong></p>



<p><a href="https://www.continuitysoftware.com/storageguard/" target="_blank" rel="noreferrer noopener">StorageGuard</a>&nbsp;is the only&nbsp;Security Posture Management solution&nbsp;purpose-built for enterprise storage and backup systems.</p>



<ul class="wp-block-list">
<li>Ensure adequate storage &amp; backup protection expertise</li>



<li>Ensure adequate storage &amp; backup security expertise</li>



<li>Perform storage &amp; backup system hardening</li>



<li>Apply vendor-recommend security configurations for all storage &amp; backup systems</li>



<li>Include storage &amp; backup in vulnerability management programs</li>
</ul>



<p class="has-medium-font-size"><strong>ISO 27040 Is a Baseline – Not the Finish Line</strong></p>



<p>One of the most important messages in ISO 27040 is that documentation alone is not enough. The standard repeatedly emphasizes validation, testing, and continuous assessment.</p>



<p>This is especially critical for storage and backup environments, where traditional vulnerability scanners often lack deep coverage, misconfigurations can persist unnoticed for years, and security posture can change overnight due to upgrades or operational changes.</p>



<p>Organizations that treat ISO 27040 as a one-time compliance exercise will miss its real value. Those that operationalize it by continuously assessing, hardening, and monitoring storage &amp; backup security will significantly improve their cyber resilience.</p>



<p class="has-medium-font-size"><strong>Final Thoughts</strong></p>



<p>Storage and backup systems are no longer passive infrastructure components. They are strategic security assets – and, if neglected, strategic liabilities.</p>



<p>ISO/IEC 27040:2024 provides a long-overdue, authoritative blueprint for protecting the systems that ultimately determine whether an organization can recover from a cyberattack.</p>



<p class="has-medium-font-size">If your storage &amp; backup systems are not secure, your security program is not complete.</p>



<p class="has-small-font-size">*The StorageGuard MCP Server is included in the Enterprise + AI edition of StorageGuard and is currently available under limited release.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p></p>



<p style="font-size:15px"><strong>Tech controls required by ISO, audited (and potentially enforced) by StorageGuard</strong></p>



<p style="font-size:15px"></p>



<figure class="wp-block-table has-small-font-size"><table class="has-cyan-bluish-gray-background-color has-background has-fixed-layout"><tbody><tr><td><strong>Control</strong><strong></strong></td><td><strong>ID</strong></td></tr><tr><td>TC-BBFC-G01 Using FC LUN masking and mapping</td><td>10.9.1</td></tr><tr><td>TC-BBFC-G02 Using FCP for SCSI security measures</td><td>10.9.1</td></tr><tr><td>TC-BBFC-G03 Using data at rest encryption for FC storage</td><td>10.9.1</td></tr><tr><td>TC-CNFD-G11 Providing end-to-end security protections for data in motion</td><td>10.5.4.1</td></tr><tr><td>TC-CNFD-G15 Limiting plaintext exposure of plaintext keys</td><td>10.5.5</td></tr><tr><td>TC-CNFD-G16 Using centralized key management infrastructure</td><td>10.5.5</td></tr><tr><td>TC-CNFD-R01 Use cryptography with at least 128 bits of security strength</td><td>10.5.3</td></tr><tr><td>TC-CNFD-R02 TLS minimum requirements</td><td>10.5.4.2</td></tr><tr><td>TC-CNFD-R03 IPsec minimum requirements</td><td>10.5.4.3</td></tr><tr><td>TC-DSGN-G01 Adhering to core security design principles</td><td>10.2.1</td></tr><tr><td>TC-FBNF-G01 Securing data on NFS servers</td><td>10.10.2</td></tr><tr><td>TC-FBNF-R01 Apply NFS access controls</td><td>10.10.2</td></tr><tr><td>TC-FBNF-R02 Restrict NFS client behaviours</td><td>10.10.2</td></tr><tr><td>TC-FBSM-G01 Securing data on SMB servers</td><td>10.10.3</td></tr><tr><td>TC-FBSM-R01 Minimum acceptable SMB protocol</td><td>10.10.3</td></tr><tr><td>TC-FBSM-R02 Apply SMB access controls</td><td>10.10.3</td></tr><tr><td>TC-FBSM-R03 Restrict SMB client behaviours</td><td>10.10.3</td></tr><tr><td>TC-FCSS-G01 Controlling FCP node access</td><td>10.8.2.2</td></tr><tr><td>TC-FCSS-G02 Using FC switch-based controls</td><td>10.8.2.2</td></tr><tr><td>TC-FCSS-G03 Configuring FC device to meet security requirements</td><td>10.8.2.2</td></tr><tr><td>TC-HARD-G03 Ensuring completeness of storage audit logging</td><td>10.3.2</td></tr><tr><td>TC-HARD-G04 Implementing appropriate monitoring of storage</td><td>10.3.2</td></tr><tr><td>TC-HARD-G05 Using log retention and protection for storage</td><td>10.3.2</td></tr><tr><td>TC-HARD-R01 Perform logging on storage</td><td>10.3.2</td></tr><tr><td>TC-IPSS-G01 Using iSCSI network access and protocols</td><td>10.8.2.3</td></tr><tr><td>TC-IPSS-G02 Using FCIP network access and protocols</td><td>10.8.2.3</td></tr><tr><td>TC-IPSS-G03 Using IPsec to secure FCIP</td><td>10.8.2.3</td></tr><tr><td>TC-MGMT-G01 Using centralized authentication solutions</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G02 Using multi-factor authentication</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G03 Disabling login to the root or admin account</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G04 Remotely logging all privilege escalation operations</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-G06 Separating security and non-security roles</td><td>10.4.2.2</td></tr><tr><td>TC-MGMT-G07 Securing the network interfaces to management software/firmware</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R01 Minimum user authentication measures</td><td>10.4.2.1</td></tr><tr><td>TC-MGMT-R02 Secure the remote management</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R03 Restrict vendor remote management</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R04 Restrict dial-up access use</td><td>10.4.3</td></tr><tr><td>TC-MGMT-R05 Secure IPMI</td><td>10.4.3</td></tr><tr><td>TC-NASP-G01 Using NFS network access and protocols</td><td>10.8.3.2</td></tr><tr><td>TC-NASP-G02 Using encryption to secure NFS</td><td>10.8.3.2</td></tr><tr><td>TC-NASP-G03 Using SMB network access and protocols</td><td>10.8.3.3</td></tr><tr><td>TC-OBSS-G01 Using transport security for object-based storage transactions</td><td>10.12</td></tr><tr><td>TC-OBSS-G02 Using data at rest encryption for object-based storage</td><td>10.12</td></tr><tr><td>TC-OBSS-G03 Enabling data immutability for object-based storage</td><td>10.12</td></tr><tr><td>TC-PROT-G02 Using data backup measures and operations securely</td><td>10.14.2</td></tr><tr><td>TC-PROT-G03 Using cyber-attack recovery backups</td><td>10.14.2</td></tr><tr><td>TC-PROT-G04 Using data replication measures and operations securely</td><td>10.14.3</td></tr><tr><td>TC-PROT-G05 Using snapshots in conjunction with backups</td><td>10.14.4</td></tr><tr><td>TC-PROT-G06 Using snapshot security</td><td>10.14.4</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-medium-font-size"><strong>Frequently Asked Questions (FAQs)</strong></p>



<h3 class="wp-block-heading has-small-font-size"><strong>Why is ISO/IEC 27040 important for cybersecurity?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 is important because storage and backup systems are increasingly targeted by ransomware and data-destructive attacks. The standard addresses long-standing security gaps by defining controls for encryption, access management, logging, protocol hardening, and data immutability—areas often overlooked by traditional security programs.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>How does ISO/IEC 27040 relate to ISO 27001 and ISO 27002?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 complements ISO 27001 and ISO 27002 by providing storage-specific security guidance that those standards do not cover in detail. While ISO 27001 defines information security management requirements and ISO 27002 lists general controls, ISO 27040 explains how to apply security controls specifically to storage, backup, and data protection technologies.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>What are the main security controls required by ISO/IEC 27040?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 defines controls across encryption, authentication, access control, logging, monitoring, protocol security, vendor access management, and secure data sanitization of storage and backup systems. Many requirements focus on eliminating insecure legacy protocols, enforcing minimum cryptographic strength, and continuously validating storage and backup security configurations.</p>



<h3 class="wp-block-heading has-small-font-size"><strong>How does ISO/IEC 27040 impact audits and compliance?</strong></h3>



<p class="has-small-font-size">ISO/IEC 27040 is increasingly used by auditors to assess whether organizations adequately protect storage and backup systems. While not a certification standard itself, it provides detailed criteria that auditors may use to evaluate compliance with ISO 27001, regulatory requirements, and cyber resilience expectations.</p>
<p>The post <a href="https://www.core6.com/blog/what-security-leaders-need-to-know-about-iso27040-storage-backup-security/">What Security Leaders Need to Know About ISO27040 – Storage &amp; Backup Security</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lessons from Enterprise Storage Leaders – 2026 Trends, Threats &#038; Transformations</title>
		<link>https://www.core6.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations/</link>
		
		<dc:creator><![CDATA[Doron Youngerwood]]></dc:creator>
		<pubDate>Mon, 19 Jan 2026 12:21:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/ai-has-changed-the-rules-of-cyber-defense-how-to-respond-2/</guid>

					<description><![CDATA[<p>Storage used to be about capacity and performance, but today it’s about resilience, security, and intelligence – a shift that became clear during a recent&#160;Storage Leaders</p>
<p>The post <a href="https://www.core6.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations/">Lessons from Enterprise Storage Leaders – 2026 Trends, Threats &amp; Transformations</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Storage used to be about capacity and performance, but today it’s about resilience, security, and intelligence – a shift that became clear during a recent&nbsp;<a href="https://www.continuitysoftware.com/resources/storage-leaders-virtual-panel-2026-trends-threats-transformations/"><strong>Storage Leaders Virtual Panel</strong></a>&nbsp;with enterprise storage leaders.</p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="256" data-id="13658" src="https://www.core6.com/wp-content/uploads/2026/01/Banner-2-1024x256.png" alt="" class="wp-image-13658" srcset="https://www.core6.com/wp-content/uploads/2026/01/Banner-2-1024x256.png 1024w, https://www.core6.com/wp-content/uploads/2026/01/Banner-2-300x75.png 300w, https://www.core6.com/wp-content/uploads/2026/01/Banner-2-150x38.png 150w, https://www.core6.com/wp-content/uploads/2026/01/Banner-2-768x192.png 768w, https://www.core6.com/wp-content/uploads/2026/01/Banner-2-1536x384.png 1536w, https://www.core6.com/wp-content/uploads/2026/01/Banner-2-2048x512.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
</figure>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">1. Industry Trends</h2>



<p class="has-medium-font-size"><strong>What do you see as the single biggest disruptor in enterprise storage &amp; backup today?</strong></p>



<p>For&nbsp;<strong>David Brown, Storage Architect at State of Michigan</strong>, the biggest disruptor is unambiguous:</p>



<p class="has-text-align-center"><em>“If you’d asked me this question 20 years ago, I would have said virtualization.<br>Today, the elephant in the room is artificial intelligence.”</em></p>



<p><strong>David</strong>&nbsp;contrasted the early days of SAN:</p>



<p class="has-text-align-center"><em>“One of the first SANs I ever put in was a whopping 5.5 terabytes. We thought, we’ll never outgrow this. Virtualization came along and we were doubling and tripling capacity almost every year.”</em></p>



<p>Now, AI and machine learning are driving a similar – but even more intense – disruption:</p>



<ul class="wp-block-list">
<li>New workloads (e.g., autonomous vehicles) are discussing yottabytes in capacity planning.</li>



<li>AI requires instant performance, low latency, and massive parallelism.</li>



<li>Storage becomes a core dependency for AI’s success, not just a downstream consumer.</li>
</ul>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">2. Security</h2>



<p class="has-medium-font-size"><strong>How are storage systems adapting to the rise in ransomware attacks?</strong></p>



<p><strong>Julian Topley, Senior Delivery Manager – Storage &amp; Backup at Lloyds Banking Group</strong>, framed the shift starkly:</p>



<p class="has-text-align-center"><em>“We’ve invested for years in perimeter security. But the real vulnerability is the destination – the data. That’s where ransomware now goes, and increasingly backups as well.”</em></p>



<p><strong>Julian</strong>&nbsp;outlined two guiding principles:</p>



<ol start="1" class="wp-block-list">
<li><strong>Protection must be layered</strong></li>
</ol>



<p class="has-text-align-center"><em>“Snapshots and replication are the frontline for fast recovery. Backup and vaulting are the last bastion for recovery and forensics.”</em></p>



<ol start="2" class="wp-block-list">
<li><strong>Storage must get “cyber-smart”</strong></li>
</ol>



<p class="has-text-align-center"><em>“Storage has to offer immutability, anomaly detection, and clean recovery points.<br>Storage needs to be smart.”</em></p>



<p class="has-medium-font-size"><strong>Are immutability and air-gapped backups becoming table stakes?</strong></p>



<p><strong>David Brown’s</strong>&nbsp;answer was unequivocal:</p>



<p class="has-text-align-center"><em>“Both immutable backups and air-gapped backups have become table stakes for a true cyber-resilient strategy. They used to be advanced features. Today they’re mandatory requirements.”</em></p>



<p>He explained why traditional backup rules are no longer enough:</p>



<p class="has-text-align-center"><em>“The old 3-2-1 rule – three copies, two media, one offsite – isn’t enough. Attackers can still corrupt those locations.”</em></p>



<p>His team is moving toward an enhanced rule:</p>



<p class="has-text-align-center"><em>“We’re looking at a 3-2-1-1-0 rule: three copies of data, two different media types, one copy stored offline, one copy immutable or vaulted, and zero errors after verification when you restore.”</em></p>



<p>On cloud and air gapping:</p>



<p class="has-text-align-center"><em>“In my opinion, cloud-written backups do not constitute an air gap.<br>There’s still access to the cloud, and as we’ve seen, the cloud is not a guaranteed safe harbor.”</em></p>



<p class="has-medium-font-size"><strong>What challenges do you foresee with evolving data sovereignty laws?</strong></p>



<p><strong>Naresh Kattel, VP Storage Management from AllianceBernstein</strong>&nbsp;pointed out that global enterprises face a patchwork of regulations:</p>



<p class="has-text-align-center"><em>“Every large enterprise operates in different markets, and every market has a regulator.<br>These regulators are unleashed on you to make sure you understand the rules.”</em></p>



<p>He outlined three practical needs: know your inventory, understand regulatory impact, and partner with legal &amp; compliance.</p>



<p class="has-medium-font-size"><strong>Should InfoSec teams build deeper storage-security expertise?</strong></p>



<p><strong>Kevin Battle</strong>&nbsp;strongly believes in deeper cross-team understanding:</p>



<p class="has-text-align-center"><em>“Absolutely. Right now everything is segmented – separate security teams, separate backup teams, separate storage teams. But with new AI-aware software, everyone has to coordinate and be aware.”</em></p>



<p>He highlighted the role of storage-security tooling:</p>



<p class="has-text-align-center"><em>“That’s what I appreciate about solutions like&nbsp;<a href="http://www.continuitysoftware.com/">StorageGuard</a>, which I’ve used for three years. It gets inside the perimeter to scan storage and SAN. Those are areas other tools just don’t touch.”</em></p>



<p><strong>Julian Topley</strong>&nbsp;agreed on shared responsibility – but warned against blurring it:</p>



<p class="has-text-align-center"><em>“The security and storage teams must share the problem, but the key is not to blur responsibility.”</em></p>



<p>He framed it in the following way:</p>



<ul class="wp-block-list">
<li><strong>Security team</strong>: owns <em>threat, policy, escalation</em></li>



<li><strong>Storage &amp; backup team</strong>: own <em>configuration, change, fabrics, protocols</em></li>
</ul>



<p>Julian explains how 3<sup>rd</sup>&nbsp;party solutions can help:</p>



<p class="has-text-align-center"><em>“Tools like StorageGuard really help here – they continuously discover storage and backup systems and add that contextual security layer, mapping configurations and firmware against live vulnerabilities and good practice.”</em></p>



<h2 class="wp-block-heading has-cyan-bluish-gray-background-color has-background">3. Technology &amp; Innovation</h2>



<p class="has-medium-font-size"><strong>How is AI changing storage management – is it hype or reality?</strong></p>



<p><strong>David Brown</strong>&nbsp;was clear:</p>



<p class="has-text-align-center"><em>“It’s definitely reality. We’re using AI for IT operations – supporting customer support, security, backup and recovery. For storage, it turns systems into active participants in maintaining uptime and data security.”</em></p>



<p>Examples he gave included:</p>



<ul class="wp-block-list">
<li><strong>Predictive maintenance</strong></li>
</ul>



<p class="has-text-align-center"><em>“Models continuously analyze logs, sensor readings, and performance to predict failures before they impact production.”</em></p>



<ul class="wp-block-list">
<li><strong>Intelligent tiering &amp; triage</strong></li>
</ul>



<p class="has-text-align-center" style="font-size:18px"><em>“We used to write scripts to move data between tiers based on age and activity.<br>AI can now constantly analyze data and predict when it might be needed, staging it preemptively.”</em></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-medium-font-size"><strong><a href="https://www.continuitysoftware.com/resources/the-storage-leaders-guide-2026-trends-threats-transformations-2/">Click here</a> to read the full report: ‘The Storage Leaders Guide’, and watch the on-demand Virtual Panel, <a href="https://www.continuitysoftware.com/resources/storage-leaders-virtual-panel-2026-trends-threats-transformations/">click here</a>.</strong></p>
<p>The post <a href="https://www.core6.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations/">Lessons from Enterprise Storage Leaders – 2026 Trends, Threats &amp; Transformations</a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How StorageGuard Helps Financial Institutions Meet DORA Requirements for Storage and Backup Systems </title>
		<link>https://www.core6.com/blog/how-storageguard-helps-financial-institutions-meet-dora-requirements-for-storage-and-backup-systems/</link>
		
		<dc:creator><![CDATA[Yaniv Valik]]></dc:creator>
		<pubDate>Thu, 15 Jan 2026 14:24:11 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://core6stg.wpenginepowered.com/blog/ai-has-changed-the-rules-of-cyber-defense-how-to-respond-2/</guid>

					<description><![CDATA[<p>The&#160;Digital Operational Resilience Act (DORA)&#160;sets&#160;clear expectations&#160;for financial institutions: ICT risks must be&#160;identified, managed,&#160;monitored, and continuously reduced.&#160;Storage and backup systems&#160;are explicitly in scope&#160;&#8211;&#160;they store regulated data, support</p>
<p>The post <a href="https://www.core6.com/blog/how-storageguard-helps-financial-institutions-meet-dora-requirements-for-storage-and-backup-systems/">How StorageGuard Helps Financial Institutions Meet DORA Requirements for Storage and Backup Systems </a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The&nbsp;<strong>Digital Operational Resilience Act (DORA)</strong>&nbsp;sets&nbsp;clear expectations&nbsp;for financial institutions: ICT risks must be&nbsp;identified, managed,&nbsp;monitored, and continuously reduced.&nbsp;Storage and backup systems&nbsp;are explicitly in scope&nbsp;&#8211;&nbsp;they store regulated data, support critical services, and are central to recovery from cyber incidents.&nbsp;</p>



<p>DORA does not prescribe specific technologies. Instead, it requires institutions to demonstrate that&nbsp;appropriate processes&nbsp;exist&nbsp;and that technical controls are actually implemented and effective over time.&nbsp;</p>



<p>DORA processes and how StorageGuard helps&nbsp;StorageGuard was designed to provide&nbsp;continuous control verification&nbsp;for enterprise storage and backup environments, making it a strong enabler of DORA compliance.&nbsp;</p>



<p><strong>This&nbsp;article will:&nbsp;</strong></p>



<ul class="wp-block-list">
<li>Explain&nbsp;how StorageGuard supports the&nbsp;<em>ICT risk management processes</em>&nbsp;required by DORA&nbsp;</li>



<li>Provide c<em>oncrete, real-world examples</em>&nbsp;mapping DORA RTS requirements to StorageGuard checks&nbsp;</li>



<li>Simplify&nbsp;adherence, investigation and&nbsp;DORA technical standards&nbsp;reporting&nbsp;with StorageGuard AI&nbsp;&nbsp;</li>
</ul>



<p class="has-medium-font-size"><strong>How StorageGuard Supports DORA ICT Risk Management Processes&nbsp;</strong></p>



<p>DORA is fundamentally process-driven. Regulators expect financial entities to show that ICT risks are managed end-to-end—not just documented in policies.&nbsp;&nbsp;</p>



<p>DORA requires financial institutions to know what ICT assets they operate, understand and assess the risks affecting those assets, define and enforce secure configuration baselines, keep systems properly maintained and supported, control access and changes, protect data and backups against loss or tampering, and continuously monitor ICT systems to detect weaknesses and emerging threats.&nbsp;&nbsp;</p>



<p>StorageGuard supports these requirements for storage and backup environments by continuously discovering assets, assessing configuration and security posture, validating secure baselines and hardening settings, highlighting outdated or unsupported platforms, verifying encryption and access controls, detecting configuration drift and risky changes, and producing ongoing, audit-ready evidence that controls are in place and effective over time.&nbsp;</p>



<p class="has-medium-font-size"><strong>The table below summarizes how StorageGuard supports key DORA-required processes for&nbsp;storage and backup systems.&nbsp;</strong></p>



<figure class="wp-block-table is-style-stripes"><table class="has-cyan-bluish-gray-background-color has-background has-fixed-layout"><tbody><tr><td><strong>DORA requirement (source)</strong>&nbsp;</td><td><strong>StorageGuard Capabilities</strong></td></tr><tr><td><strong>Define secure configuration baselines</strong>&nbsp;<br><br><strong><em>RTS Article 11</em></strong>&nbsp;<br><em>“identification&nbsp;of secure configuration baseline for ICT assets that will&nbsp;minimise&nbsp;their exposure to cyber threats and measures to verify regularly that these baselines are those that are effectively deployed…&nbsp;</em>&nbsp;<br><em>baseline shall&nbsp;take into account&nbsp;leading&nbsp;practices and appropriate techniques…“</em>&nbsp;<br><em>“implementation&nbsp;of vendor recommended settings&nbsp;“</em>&nbsp;<br><br><strong>RTS Article 13(k)</strong>&nbsp;<br><em>“the&nbsp;implementation of a secure configuration baseline of all network components and hardening the network and network devices according to vendor instructions”</em>&nbsp;<br><br><strong>Article 16</strong>&nbsp;<br><em>“continuously&nbsp;monitor the security and functioning of all ICT systems…&nbsp;minimise&nbsp;the impact of ICT risk through resilient and updated systems&nbsp;protocols and tools”</em>&nbsp;<br><br><strong>Article 8</strong>&nbsp;<br><em>“on&nbsp;a continuous basis…&nbsp;identify all sources of ICT”</em>&nbsp;</td><td>StorageGuard provides a solution for secure configuration baselines for Storage and Backup systems:&nbsp;<br><br>&#8211; Continuously updated library of secure configuration checks based on&nbsp;industry standards and vendor guidelines&nbsp;<br><br>&#8211; Provides out-of-the-box tunable secure configuration baselines&nbsp;<br><br>&#8211; Verifies regularly&nbsp;baselines are implemented using a purpose-built scanner&nbsp;and detection engine<br><br>&#8211; Generate findings for baseline&nbsp;violations (drifts) including&nbsp;evidence,&nbsp;remediation&nbsp;guidance&nbsp;and&nbsp;best practice&nbsp;detail&nbsp;<br><br>&#8211; Agentless scanner capable of gathering storage and backup appliance&nbsp;configurations&nbsp;</td></tr><tr><td><strong>Vulnerability Scanning&nbsp;and Assessment</strong>&nbsp;<br><br><strong>Article 8</strong>&nbsp;<br><em>“on&nbsp;a continuous basis&nbsp;…assess cyber threats and ICT vulnerabilities…”</em>&nbsp;<br><br><strong><em>Article 13</em></strong>&nbsp;<br><em>“Gather information on vulnerabilities…&nbsp;analyse&nbsp;the impact they are likely to have”</em>&nbsp;<br><br><strong>RTS 2 (60, 62, 63)</strong>&nbsp;<br><em>“Regular automated vulnerability scanning and assessments, typically using specialized software tools, of ICT assets are required…&nbsp;at least on a weekly basis&nbsp;for those ICT assets supporting critical or important functions&nbsp;“</em>&nbsp;<br><em>“prioritize&nbsp;patch deployment based on vulnerability criticality and risk profiles, while monitoring and verifying remediation&nbsp;“</em>&nbsp;<br><em>“record&nbsp;detected vulnerabilities, evaluate software and hardware patches and updates”&nbsp;</em>&nbsp;<br><br><strong>RTS Article 31</strong>&nbsp;<br><em>“continuously&nbsp;monitor&nbsp;…vulnerabilities relevant to their critical or important functions”</em>&nbsp;</td><td>&#8211; Continuously updated knowledgebase of security advisories, bulletins,&nbsp;alerts&nbsp;and CVEs&nbsp;<br><br>&#8211; Identification of storage and backup systems exposed to said vulnerabilities&nbsp;<br><br>&#8211; Risk-based vulnerability prioritization&nbsp;through&nbsp;severity and exploitability&nbsp;detail&nbsp;<br><br>&#8211; Agentless scanner capable of gathering storage and backup appliance&nbsp;settings,&nbsp;firmware&nbsp;and patching – unlike any other vulnerability scanner&nbsp;</td></tr><tr><td><strong>Assess risk after major changes&nbsp;</strong>&nbsp;<br><br><strong>Article 8</strong>&nbsp;<br><strong><em>“</em></strong><em>perform&nbsp;a risk assessment upon each major change in the network and information system infrastructure”</em>&nbsp;<br><br><strong><em>RTS Article&nbsp;31 (e)</em></strong>&nbsp;<br><em>“identification&nbsp;and assessment of any ICT and information security risks resulting from any major change in ICT system or ICT services,&nbsp;processes&nbsp;or procedures, as well as from ICT security testing results and after any major ICT-related incident.&#8221;</em>&nbsp;</td><td>&#8211; StorageGuard automatically&nbsp;identifies&nbsp;security risks for Storage and Backup systems by reviewing their&nbsp;current&nbsp;configuration.&nbsp;&nbsp;<br><br>&#8211; StorageGuard scan can be scheduled to run regularly or&nbsp;can be executed on demand after significant changes</td></tr><tr><td><strong>Identify&nbsp;ICT assets&nbsp;and Map Configurations</strong><br><strong><em>&nbsp;</em></strong>&nbsp;<br><strong>Article 8&nbsp;(2, 6)&nbsp;</strong><br><em>“identify&nbsp;all ICT assets… hardware equipment… map the configuration of the ICT assets”</em>&nbsp;<br><em>“maintain&nbsp;relevant inventories and update them periodically and every time any major change”</em>&nbsp;</td><td>&#8211; StorageGuard discovers and&nbsp;maintains&nbsp;an inventory of Storage and Backup systems – hardware and software&nbsp;<br><br>&#8211; StorageGuard&nbsp;gathers&nbsp;detailed configuration&nbsp;map&nbsp;for each scanned Storage and Backup&nbsp;systems&nbsp;including&nbsp;OS version, firmware, patches, security settings, system settings and more.&nbsp;</td></tr><tr><td><strong>Article 6</strong>&nbsp;<br><em>“minimise&nbsp;the impact of ICT risk by deploying tools”</em>&nbsp;</td><td>&#8211; StorageGuard is&nbsp;the&nbsp;leading solution for minimizing ICT risk across Storage and Backup systems, with its purpose-built scanner and continuously updated knowledgebase of storage and backup security best practices, vendor&nbsp;hardening&nbsp;guidelines&nbsp;and vulnerabilities.&nbsp;&nbsp;</td></tr></tbody></table></figure>



<p class="has-medium-font-size"><strong>StorageGuard Checks&nbsp;for&nbsp;DORA&nbsp;Regulatory Technical Standards (RTS)&nbsp;</strong></p>



<p>DORA and even more so&nbsp;DORA RTS translates&nbsp;regulatory intent into&nbsp;<strong>verifiable technical expectations</strong>. StorageGuard addresses these expectations by checking&nbsp;<strong>real configurations</strong>&nbsp;in storage and backup systems.&nbsp;</p>



<p>The examples below are illustrative, not exhaustive. StorageGuard covers hundreds of&nbsp;additional&nbsp;checks aligned with DORA and its RTS, as well as other&nbsp;regulations, industry&nbsp;standards&nbsp;and cybersecurity frameworks.&nbsp;</p>



<p><strong>DORA RTS mappings to StorageGuard controls&nbsp;</strong></p>



<figure class="wp-block-table is-style-stripes"><table class="has-cyan-bluish-gray-background-color has-background has-fixed-layout"><tbody><tr><td><strong>DORA requirement (quote &amp; article)</strong></td><td><strong>Examples:&nbsp;Mapped&nbsp;StorageGuard&nbsp;Checks</strong></td></tr><tr><td><strong>RTS Article 12(2)(f)</strong>&nbsp;<br><em>“Synchronisation&nbsp;of the clocks of each ICT system upon a documented reliable reference time source”</em>&nbsp;</td><td>&#8211; NTP server configuration&nbsp;<br>&#8211; Approved NTP servers&nbsp;<br>&#8211; NTP server redundancy&nbsp;<br>&#8211; Secure NTP status&nbsp;<br>&#8211; And more.&nbsp;</td></tr><tr><td><strong>RTS Article 13(1)(l)</strong>&nbsp;<br><em>“Limit, lock and terminate system and remote sessions after a predefined period of inactivity”</em>&nbsp;</td><td>&#8211; Idle session timeout (GUI)&nbsp;<br>&#8211; Idle session timeout&nbsp;(CLI)&nbsp;<br>&#8211; Absolute session timeout&nbsp;<br>&#8211; Inactive&nbsp;NFS&nbsp;&nbsp;session&nbsp;timeout&nbsp;<br>&#8211; Remote support session timeout&nbsp;<br>&#8211; And more.&nbsp;</td></tr><tr><td><strong>RTS Article 21</strong>&nbsp;<br><em>“access&nbsp;rights to ICT assets based on need-to-know, need-to-use and least privilege principles&nbsp;…&nbsp;Provision on restrictions of access to ICT assets”</em>&nbsp;<br><em>“Assignment of access rights must be &#8220;based on need-to-know, need-to-use and least privilege principles,&nbsp;including for&nbsp;remote and emergency access.&#8221;</em>&nbsp;<br><em>&#8220;Provision on user accountability, by limiting to the extent possible the use of generic and shared user accounts and ensuring that users are identifiable for the actions performed.&#8221;</em>&nbsp;<br><br><strong>Regulation Article 9(4)(c)</strong>&nbsp;<br><em>Limit…&nbsp;logical access to&nbsp;…&nbsp;ICT assets to what is&nbsp;required&nbsp;for legitimate and approved functions and activities only, and&nbsp;establish&nbsp;…&nbsp;controls that address access rights and ensure a sound administration”</em>&nbsp;</td><td>&#8211; Strict Management IP&nbsp;ACLs&nbsp;<br>&#8211; Concurrent session limits&nbsp;<br>&#8211; Approved Users&nbsp;/ Groups&nbsp;<br>&#8211; IP&nbsp;Filter&nbsp;<br>&#8211; CHAP authentication&nbsp;<br>&#8211; MFA&nbsp;<br>&#8211; Account Lockout&nbsp;<br>&#8211; Password Rules&nbsp;<br>&#8211; RBAC and group mapping&nbsp;<br>&#8211; File share access rights&nbsp;<br>&#8211; Central authentication&nbsp;<br>&#8211; Non-default local users&nbsp;<br>&#8211; Default Passwords&nbsp;<br>&#8211; Inactive user accounts&nbsp;<br>&#8211; Default SAN Zone&nbsp;<br>&#8211; File share allowed clients&nbsp;<br>&#8211; Identity&nbsp;provider configuration&nbsp;<br>&#8211; NFS root squash&nbsp;<br>&#8211; Default users&nbsp;<br>&#8211; And more.&nbsp;</td></tr><tr><td><strong>RTS Article 10&nbsp;(4)</strong>&nbsp;<br><em>“identify&nbsp;and evaluate available software and hardware patches and updates using automated&nbsp;tools..&nbsp;set deadlines for the installation of software and hardware patches and updates”</em>&nbsp;</td><td>&#8211; Platform currency checks, including:&nbsp;<br>&#8211; OS and firmware versions&nbsp;<br>&#8211; Approved platform versions&nbsp;<br>&#8211; End-of-support and end-of-security-updates detection&nbsp;<br>&#8211; Exposure to security advisories&nbsp;<br>&#8211; Vulnerabilities&nbsp;<br>&#8211; And more.&nbsp;</td></tr><tr><td><strong>Article 9(2)</strong>&nbsp;<br>“maintain&nbsp;high standards of&nbsp;…&nbsp;confidentiality of data, whether at rest, in use or in transit.”&nbsp;<br><br><strong>RTS Article 6</strong>&nbsp;<br><em>“policy&nbsp;on encryption and cryptographic controls…&nbsp;rules for the encryption of data at rest and in transit&nbsp;…&nbsp;for the encryption of internal network connections&nbsp;…&nbsp;cryptographic key management establishing the correct use, protection and lifecycle of cryptographic keys”</em>&nbsp;<br><br><strong>RTS Article 7</strong>&nbsp;<br><em>“implement&nbsp;controls to protect cryptographic keys</em>&#8220;</td><td>&#8211; Data-at-rest encryption&nbsp;<br>&#8211; Backup data encryption&nbsp;<br>&#8211; Encryption strength&nbsp;<br>&#8211; Disk Drive encryption (SED)&nbsp;<br>&#8211; Data-in-transit encryption&nbsp;<br>&#8211; TLS version and cipher strength&nbsp;&nbsp;<br>&#8211; KMS / KMIP configuration&nbsp;<br>&#8211; Secure LDAP&nbsp;<br>&#8211; Cleartext protocols are disabled&nbsp;<br>&#8211; Pool encryption&nbsp;<br>&#8211; Certificate best practices&nbsp;<br>&#8211; Hash algorithm strength&nbsp;<br>&#8211; Replication encryption&nbsp;<br>&#8211; Node communication encryption&nbsp;<br>&#8211; Volume encryption&nbsp;<br>&#8211; SMB / NFS&nbsp;/ S3&nbsp;data in transit&nbsp;encryption&nbsp;&nbsp;<br>&#8211; And more.&nbsp;</td></tr><tr><td><strong>RTS Article 13(1)(a)</strong>&nbsp;<br><em>“the&nbsp;segregation and segmentation of ICT systems and networks…&nbsp;</em>&nbsp;<br><em>the use of a separate and dedicated network for the administration of ICT assets”</em>&nbsp;</td><td>&#8211; Data and&nbsp;management&nbsp;network&nbsp;separation&nbsp;<br>&#8211; Backup domain separation&nbsp;<br>&#8211; Backup user access separation&nbsp;<br>&#8211; Restricted management access&nbsp;<br>&#8211; No user access on replication interfaces&nbsp;<br>&#8211; And more.&nbsp;</td></tr><tr><td><strong>RTS Article 12</strong>&nbsp;<br><em>“identification&nbsp;of the events to be logged, the retention period of the logs and the measures to secure and handle the log data…&nbsp;</em><strong><em>&nbsp;alignment of the level of detail of the logs&nbsp;…&nbsp;</em></strong><em>Measures to protect logging systems and log information against tampering, deletion and&nbsp;unauthorised&nbsp;access at rest, in transit and, where relevant, in use.&#8221;</em>&nbsp;</td><td>&#8211; Log forwarding&nbsp;<br>&#8211; Audit logging&nbsp;enabled&nbsp;<br>&#8211; Syslog server configuration&nbsp;<br>&#8211; Event types being logged&nbsp;<br>&#8211; Event types being&nbsp;forwarded&nbsp;<br>&#8211; Log&nbsp;forwarding&nbsp;security&nbsp;<br>&#8211; Log retention&nbsp;<br>&#8211; Log forward protocol&nbsp;<br>&#8211; Authorized syslog server&nbsp;</td></tr><tr><td><strong>Article 12</strong>&nbsp;<br><em>&#8220;The activation of backup systems shall not&nbsp;jeopardise&nbsp;the security of the network and information systems or the availability, authenticity, integrity or confidentiality of data.&#8221;</em>&nbsp;<br><em>“When restoring backup… financial entities shall use ICT systems that are physically and logically segregated from the source ICT system. The ICT systems shall be securely protected from any unauthorized access or ICT corruption”</em>&nbsp;<br><br><strong>RTS article 8</strong>&nbsp;<br><em>controls and monitoring of ICT systems, including&nbsp;all of&nbsp;the following: (i) backup and restoration requirements of ICT systems;&nbsp;</em>&nbsp;<br><br><strong>Article 26</strong>&nbsp;<br><em>ensure the availability, integrity,&nbsp;continuity&nbsp;and recovery of at least ICT systems and services supporting critical or&nbsp;important functions&nbsp;of the financial entities</em>&nbsp;&nbsp;</td><td>&#8211; Encrypted backups&nbsp;<br>&#8211; Immutable backup&nbsp;<br>&#8211; Protected&nbsp;storage&nbsp;snapshots&nbsp;<br>&#8211; Data copy retention period&nbsp;<br>&#8211; Retention-lock enforcement&nbsp;mode&nbsp;<br>&#8211; Backup&nbsp;network&nbsp;separation&nbsp;<br>&#8211; Backup user access separation&nbsp;<br>&#8211; Multi person authorization&nbsp;<br>&#8211; Backup management ACL&nbsp;<br>&#8211; Backup Integrity validation enabled&nbsp;<br>&#8211; Backup&nbsp;malware scan&nbsp;enabled&nbsp;<br>&#8211; Backup&nbsp;anomaly detection&nbsp;enabled&nbsp;<br>&#8211; Backup data in-transit encryption&nbsp;<br>&#8211; Backup infrastructure communication encryption&nbsp;<br>&#8211; Backup appliance vulnerability identification&nbsp;<br>&#8211; Backup appliance firmware and software end of support&nbsp;<br>&#8211; And more.&nbsp;</td></tr><tr><td></td><td></td></tr></tbody></table></figure>



<p class="has-small-font-size">This&nbsp;represents&nbsp;only a&nbsp;subset&nbsp;of&nbsp;StorageGuard’s&nbsp;coverage, which spans hundreds of checks aligned to DORA and its RTS.&nbsp;</p>



<p class="has-medium-font-size"><strong>Using StorageGuard MCP and AI to Accelerate,&nbsp;Maintain&nbsp;and Prove&nbsp;DORA Compliance&nbsp;&nbsp;</strong></p>



<p>DORA compliance is not only about implementing controls, but also about preparing,&nbsp;validating, and&nbsp;demonstrating&nbsp;evidence across teams such as IT, security, risk, and audit. This is often where organizations struggle—especially in complex storage and backup environments.&nbsp;</p>



<p>The StorageGuard MCP*&nbsp;(Model Context Protocol) server enables secure integration between StorageGuard and AI-based assistants, allowing users to interact with StorageGuard findings using natural language while&nbsp;remaining&nbsp;grounded in authoritative, real configuration data.&nbsp;</p>



<p><strong>With MCP-enabled AI access, teams can:&nbsp;</strong></p>



<ul class="wp-block-list">
<li><strong>Prepare for DORA assessments more efficiently&nbsp;<br></strong>Ask questions such as&nbsp;<em>“Which storage systems are not aligned with our secure configuration baseline?”</em>&nbsp;or&nbsp;<em>“Where do we have encryption gaps in backups?”</em>&nbsp;and receive answers backed by&nbsp;StorageGuard’s&nbsp;continuously collected evidence.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Validate compliance against DORA expectations&nbsp;<br></strong>Quickly review whether key DORA processes—such as&nbsp;asset coverage, access controls, encryption, logging, or recovery protections—are consistently enforced across the environment.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Produce audit-ready explanations and evidence&nbsp;<br></strong>Translate technical findings into clear, structured explanations suitable for risk teams, internal audit, or regulators, without manually assembling data from multiple tools.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Reduce dependency on individual expertise&nbsp;<br></strong>MCP allows institutional knowledge to be embedded into the platform, helping teams respond consistently even as personnel or responsibilities change.&nbsp;</li>
</ul>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-5 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="396" data-id="13601" src="https://www.core6.com/wp-content/uploads/2026/01/DORA-post-AI-image-1024x396.png" alt="" class="wp-image-13601" srcset="https://www.core6.com/wp-content/uploads/2026/01/DORA-post-AI-image-1024x396.png 1024w, https://www.core6.com/wp-content/uploads/2026/01/DORA-post-AI-image-300x116.png 300w, https://www.core6.com/wp-content/uploads/2026/01/DORA-post-AI-image-150x58.png 150w, https://www.core6.com/wp-content/uploads/2026/01/DORA-post-AI-image-768x297.png 768w, https://www.core6.com/wp-content/uploads/2026/01/DORA-post-AI-image.png 1429w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
</figure>



<p class="has-medium-font-size"><strong>Summary&nbsp;</strong></p>



<p>DORA compliance is not achieved through documentation alone. Financial institutions must&nbsp;demonstrate&nbsp;that ICT risks are&nbsp;continuously&nbsp;identified, controlled, and reduced in practice.&nbsp;</p>



<p><strong>StorageGuard helps organizations do exactly that by:&nbsp;</strong></p>



<ul class="wp-block-list">
<li>Providing continuous visibility into storage and backup ICT assets&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Enforcing secure configuration baselines&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Detecting vulnerabilities, drift,&nbsp;weaknesses&nbsp;and risky changes&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Producing audit-ready evidence aligned with DORA requirements&nbsp;</li>
</ul>



<p>By embedding StorageGuard into the ICT risk management framework, organizations move from periodic compliance exercises to continuous&nbsp;ICT risk&nbsp;management for Storage and Backup platforms &#8211; mission-critical ICT data assets.&nbsp;</p>



<p class="has-small-font-size">* The StorageGuard MCP Server is included in the&nbsp;&#8216;Enterprise+AI&nbsp;edition&#8217; of StorageGuard, and currently under limited availability.</p>



<p><strong>To see how StorageGuard can help with audit readiness, go to: <br></strong> https://www.core6.com/storageguard-for-compliance-audit-readiness/</p>
<p>The post <a href="https://www.core6.com/blog/how-storageguard-helps-financial-institutions-meet-dora-requirements-for-storage-and-backup-systems/">How StorageGuard Helps Financial Institutions Meet DORA Requirements for Storage and Backup Systems </a> appeared first on <a href="https://www.core6.com">Core6</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
