Where to get cyber news: Useful links.
Here are a number of publications I use to 'try' to keep up with everything happening in cyber security: https://thehackernews.com/ https://www.darkreading.com/ https://www.scworld.com/ https://www.securityweek.com/ https://www.cybersecuritydive.com/ https://www.infosecurity-magazine.com/82Views3likes0CommentsCyber Resilience Podcast - Live
Hey folks....I had the pleasure to sit down with John Gilroy from The Federal Tech Podcast to discuss Cyber Resilience Strategies for Federal customers from TechNet Cyber in Baltimore. There was even a fire alarm and evacuation 6 seconds into the recording. Live streaming, baby! Nothing like it :) Check it out! How Federal Agencies Can Achieve Cyber-Resilient Data Protection and Recovery Federal Tech Podcast - Episode 23898Views3likes0CommentsFrom Passive to Proactive: A New Cyber Resilience Foundation
We are thrilled to announce a significant evolution of the Pure Storage Cyber Resilience solution, designed to transform your defense posture from passive to proactive. The announcements on September 25th deliver on three core pillars that are essential for modern defense: 1. Dynamic Response and Recovery: Recovery time must be measured in minutes, not days. We're introducing Pure Protect™ Recovery Zones to automatically provision Isolated Recovery Environments (IREs), plus a new Cyber Resilience delivered as a Service model with Veeam to guarantee instant, validated recovery. 2. Connected Detection: We’re eliminating security blind spots by embedding detection into the data layer itself. We have several new native detection capabilities and new integrations with CrowdStrike Real-Time Threat Graph and Superna Next-Gen SIEM to accelerate threat detection and remediation. 3. Built-in Security: Security is foundational. Our platform now features mandatory safeguards like TPM and UEFI Secure Boot and Enterprise-Grade Identity and Access Management to ensure the integrity of your platform from the ground up. See our Cyber Resilience announcement blog for more details.80Views2likes0CommentsRansomware’s Worst Nightmare: New Cyber Resilience Arsenal (new blog post)
With the barrage of new announcements coming out of NYC Accelerate, I wrote a new blog post that is relevant to all customers, but specific to State / Local Government and Education customers summarizing what is new and the value it brings in terms of Active Cyber Resilience. Your feedback is welcome: https://goo.gle/3xzWj8P z100Views2likes0CommentsModernizing Mainframe backups for Comprehensive Cyber Resilience Strategy
I've been talking to our Healthcare Payer customers, as well as almost all of the Fortune 500, about how Pure can help to incorporate Mainframe backup and recovery into their overall Cyber Resilience strategy. It is best practice to protect your data across the enterprise and with our Luminex + Pure solution, all your data can be protected under one plan. I'm interested to hear if anyone else is finding challenges with this process.115Views2likes0CommentsData Intelligence and Cyber Resilience
Over the next few months you will be hearing more about data intelligence from Everpure. What is it? How is it relevant to cyber resilience? Data intelligence is the practice of transforming raw data into actionable insights through automated discovery, classification, and metadata analysis. In the modern threat landscape, it is the essential bridge between simple "backup" and true Active Resilience. Without intelligence, resilience is blind. Data intelligence provides the "who, what, and where" of your digital estate, allowing you to: Prioritize Recovery: Identify mission-critical applications and sensitive PII to ensure the most vital services are restored first. Accelerate Detection: Use AI-driven behavioral analysis to spot "silent" corruption or unauthorized access at the storage layer. Ensure Clean Restoration: Precisely tag compromised data to prevent re-infecting environments during recovery. By unifying data security with intelligence, organizations move from being passive targets to Active Defenders, ensuring operational survivability even in the face of sophisticated agentic attacks.38Views1like0CommentsWhy Cyber Resilience Requires Recovery Not Just Backups: CISO and Field Perspectives
15 Minutes---Webinar from Everpure's Rick Orloff, CISO, and Scott Taylor, Director of Cyber Resilience Field Solution Architects on Cyber Recovery Strategy Resilience isn't just prevention—it’s about the "Minimum Viable Business." At RSAC 2026, Everpure’s Rick Orloff and Scott Taylor explained why recovery fails without understanding dependencies. Prioritize critical data and cross-functional collaboration to minimize revenue disruption. Stop treating backup as the goal; make rapid, strategic recovery your mission. Link to Webinar83Views1like0CommentsEverpure Protect - Tools for Network Configuration
A key workflow item, especially when building Isolated Recovery Environments (IRE), Clean Rooms, test or production Disaster Recovery, or any other environment personality, is to reconfigure the network. Doing so automatically and per a plan is important to an automated, fast, and predictable workflow. We have built Everpure Protect Tools, which is a lightweight tool, registered with VMtools within a guest, that allows us to automate network configuration changes, per the individual Recovery Plan. Included in the download is a Powershell script for Windows, or a Shell script for Linux/Unix, which registered our tool with VMtools to perform the changes. The scripts can be loaded and ran manually in each guest, or distributed and executed as part of a workflow such as Microsoft MCM/SCCM. Everpure Protect Tools Once deployed, network changes on a per-VM or per-Recovery Plan basis will be automatically performed based upon the unique settings in the Recovery Plan being executed.416Views1like0CommentsEverything Ransomware: Ransomware Live
Check it out! Really interesting tracking of everything related to ransomware. https://www.ransomware.live/ Ransomware Live is a real-time intelligence site tracking active ransomware groups, victims, leaks, and extortion activity, helping security teams monitor threats, trends, and attacker behavior worldwide.81Views1like0Comments