Cyber Resilience Podcast - Live
Hey folks....I had the pleasure to sit down with John Gilroy from The Federal Tech Podcast to discuss Cyber Resilience Strategies for Federal customers from TechNet Cyber in Baltimore. There was even a fire alarm and evacuation 6 seconds into the recording. Live streaming, baby! Nothing like it :) Check it out! How Federal Agencies Can Achieve Cyber-Resilient Data Protection and Recovery Federal Tech Podcast - Episode 2388Views2likes0CommentsModernizing Mainframe backups for Comprehensive Cyber Resilience Strategy
I've been talking to our Healthcare Payer customers, as well as almost all of the Fortune 500, about how Pure can help to incorporate Mainframe backup and recovery into their overall Cyber Resilience strategy. It is best practice to protect your data across the enterprise and with our Luminex + Pure solution, all your data can be protected under one plan. I'm interested to hear if anyone else is finding challenges with this process.36Views2likes0CommentsHave you encountered any instances where QR codes were used as part of a phishing attempt targeting your organization?
What steps did you take to immediately secure your organization and to improve education of the staff? Check out this article, Navigating the Threat of QR Codes as a Gateway to Data Theft.25Views0likes0CommentsCybersecurity: A Team Sport?
In this Pure Report, Jason Walker and Jason Langer explain why cyber resilience needs to break down silos between IT and security teams. With cyber threats on the rise, teamwork is key! Which of the NIST framework areas does your team collaborate on the most?21Views0likes0CommentsHow often do you reassess third-party security measures?
What prompts these reviews? In today’s interconnected business landscape, third-party cyber threats are an ever-increasing concern, often posing risks that companies overlook. The Pure Storage white paper, "Nine Tips to Block Third-Party Cyber Attacks," offers practical strategies to strengthen supply chain security and minimize vulnerabilities. Read about it!25Views0likes0CommentsPure Storage continues to take big steps in empowering organizations to bolster their security
Dive into how we built Threat Model Mentor GPT, an AI-powered tool designed to make cybersecurity expertise more accessible for everyone. Read about it here! How do you currently approach threat modeling in your organization?29Views0likes0CommentsI don’t know about you, but I can’t help but feel a little overwhelmed with the constant need for better cybersecurity
Do you think it's possible to ever be fully prepared for all the different kinds of threats out there? Ever wondered how hackers exploit your network? Check out this blog to see how the “Pass-the-Hash” attack works and what you can do to protect your systems from it. It’s eye-opening!26Views0likes0Comments