Something BIG is Coming! Find Out >>

Posts by Anthony Cusimano

Anthony Cusimano
Anthony Cusimano has worked in many roles in tech for over a decade. He started as a developer, shifted to sales, and masterfully moved into marketing. He is a passionate gamer who stays up to date on all things technology to ensure he can achieve as many frames per second as possible on his gaming PC. He enjoys speaking at events and has previously shared the stage with astronauts and MARVEL superheroes. Anthony enjoys the nerdier things in life, watching classic movies, building Gundams, and flying questionably legal FPV drones in abandoned mall parking lots. When he isn't geeking out on the latest fad, he and his wife Sarah enjoy visiting lesser-known Florida destinations and spoiling their two dogs, Luna and Smudge.
May 16, 2024 | 8 min to read

Not Zero Trust Backup Architectures

In blog #2 of this series, we delved into the central principles of the Zero Trust Data Resilience (ZTDR) model: segmentation, multiple data resilience zones, and immutable backup storage. This model and architecture, a collaborative effort between Veeam and Numberline Security, extends CISA’s Zero Trust principles and Maturity Model to the enterprise data backup and recovery use case. 

May 09, 2024 | 7 min to read

3 Zero Trust Principles for Data Backup

In blog #1 of this series, we have outlined Zero Trust principles and introduced the new Zero Trust Data Resilience (ZTDR) model. The ZTDR model and architecture have been developed in collaboration between Veeam and Numberline Security. It extends the tenets of CISA’s Zero Trust Maturity Model with the following principles that cover enterprise data backup and recovery.

April 18, 2024 | 7 min to read

Zero Trust and Enterprise Data Backup and Recovery

The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security. 

March 28, 2024 | 5 min to read

3 Ways to Improve Recovery Rates on World Backup Day

This year, I wanted to enhance some of the tips I shared last year and mix some spicy new ones to help all backup-minded individuals find the peace of mind they deserve. Consider this blog an amendment to the previous World Backup Day constitution.  

February 29, 2024 | 5 min to read

The Importance of Being Simple

Simplicity, on the other hand, can be a powerful tool in enhancing data center security. A simpler system is easier to understand, monitor, and secure. It reduces the number of potential attack vectors and makes it easier to spot anomalies.

Here are some ways simplicity can be incorporated into data center security.

February 08, 2024 | 4 min to read

Celebrate Safer Internet Day with Zero Trust for Normies!

Internet Safety might seem less important than car or home safety due to its digital nature. But recently, many have come to grips with how our information is constantly used for better or worse and how that can lead to dangerous consequences both in the digital world and the physical. Recent years have seen the rise of cyberbullying, social engineering, browser-based attacks, doxxing, and DDOS attacks, to name a few terrible ways people use the internet as a weapon.

January 25, 2024 | 4 min to read

Locking the Doors to Your Data: Keeping Your Data Private in the Digital Age

You have probably heard of (or lived in) a time when you didn’t have to lock the doors to your home. Over the years, we learned that locks are essential security features for any building and ensure safety and privacy for those inside. This analogy perfectly aligns with where we are today with data privacy. Many are realizing that putting ourselves on the internet with no “locks” or consideration for our security and privacy can be pretty risky.

December 14, 2023

Ransomware Response Plan: How to Recover After the Attack

Ransomware spares no one. Mid-size organizations, schools, libraries, and even hospitals—all suffer ransomware attacks as often as once every eleven seconds. The chances of getting hit with ransomware are never zero, regardless of a company’s security posture. In other words, it’s not a question of if but when the attack will occur. The prevalence of…

September 12, 2023

Data Backup: Definition, Options, Types and Solutions

Data backup is an indispensable part of modern business operations. Whether you are an IT professional responsible for safeguarding your company’s data or an individual looking to protect your files, you need a robust backup solution to defend against failures, ransomware attacks, or other disasters. Explore topics such as the importance of IT backup, different…

September 01, 2023

Ransomware Backup Protection: Fortify Your Business Against Cyber Threats

In 2023, attackers increasingly target backup data in 93% of cyber-attacks, successfully hindering victims’ recovery capabilities in three-quarters of these incidents. The consequences of falling victim are dire, including permanent data loss, financial devastation, and significant reputational damage, leading to disrupted operations, eroded customer trust, and even regulatory penalties. Learn how to protect backups from…

April 04, 2023 | 4 min to read

From small businesses to big tech: everyone has a role in ensuring cybersecurity

The recent release of the National Cyber Strategy by the Biden administration marks a significant shift new chapter in how cybersecurity is approached in the United States. The strategy highlights the need to shift the burden of cybersecurity from individuals, small businesses, and local governments, and instead, it puts the responsibility in the hands of software developers and other tech companies

October 27, 2022 | 5 min to read

Cyberattacks: a personal account

Everyone knows someone who has been affected by ransomware, and if you are reading this blog, you now know another. My experience with ransomware attacks is not because I downloaded some wacky .exe or failed a funny phishing test. My data was exposed alongside many others in a massive breach over five years ago.

September 29, 2022 | 3 min to read

Let’s talk about cloud storage

Firstly, if you read our most recent blog series about various storage platforms, thank you. If you haven’t, I recommend checking out the third and final piece covering object storage and how it mainly benefits cloud users today (and very soon Object First’s on-premises customers as well!).