Pure Storage continues to take big steps in empowering organizations to bolster their security
Dive into how we built Threat Model Mentor GPT, an AI-powered tool designed to make cybersecurity expertise more accessible for everyone. Read about it here! How do you currently approach threat modeling in your organization?14Views0likes0CommentsHow often do you reassess third-party security measures?
What prompts these reviews? In today’s interconnected business landscape, third-party cyber threats are an ever-increasing concern, often posing risks that companies overlook. The Pure Storage white paper, "Nine Tips to Block Third-Party Cyber Attacks," offers practical strategies to strengthen supply chain security and minimize vulnerabilities. Read about it!13Views0likes0CommentsIs it possible to be fully prepared for all cyber threats?
I don’t know about you, but I can’t help but feel a little overwhelmed with the constant need for better cybersecurity. Do you think it's possible to ever be fully prepared for all the different kinds of threats out there? Ever wondered how hackers exploit your network? Check out this blog to see how the “Pass-the-Hash” attack works and what you can do to protect your systems from it. It’s eye-opening!10Views0likes0CommentsHave you encountered any instances where QR codes were used as part of a phishing attempt targeting your organization?
What steps did you take to immediately secure your organization and to improve education of the staff? Check out this article, Navigating the Threat of QR Codes as a Gateway to Data Theft.9Views0likes0CommentsCybersecurity: A Team Sport?
In this Pure Report, Jason Walker and Jason Langer explain why cyber resilience needs to break down silos between IT and security teams. With cyber threats on the rise, teamwork is key! Which of the NIST framework areas does your team collaborate on the most?8Views0likes0CommentsI don’t know about you, but I can’t help but feel a little overwhelmed with the constant need for better cybersecurity
Do you think it's possible to ever be fully prepared for all the different kinds of threats out there? Ever wondered how hackers exploit your network? Check out this blog to see how the “Pass-the-Hash” attack works and what you can do to protect your systems from it. It’s eye-opening!8Views0likes0CommentsIs there a way to view lower level Fibre Channel diagnostic
Is there a way to view lower level Fibre Channel diagnostic logs from the CLI? We are having an issue with some VMware hosts not getting a response to a PLOGI so they are not able to see any volumes from the Pure array on one of our fabrics. Other storage systems on the same fabric are working fine.6Views0likes0Comments