Anthony Cusimano has worked in many roles in tech for over a decade. He started as a developer, shifted to sales, and masterfully moved into marketing. He is a passionate gamer who stays up to date on all things technology to ensure he can achieve as many frames per second as possible on his gaming PC. He enjoys speaking at events and has previously shared the stage with astronauts and MARVEL superheroes. Anthony enjoys the nerdier things in life, watching classic movies, building Gundams, and flying questionably legal FPV drones in abandoned mall parking lots. When he isn't geeking out on the latest fad, he and his wife Sarah enjoy visiting lesser-known Florida destinations and spoiling their two dogs, Luna and Smudge.
Cybersecurity Awareness Month: Don't Get Spooked by Ransomware!
As a Floridian, I miss out on the autumn colors, but that doesn't stop me from celebrating my favorite holiday: Halloween. October is the time for horror movies, disgustingly oversized lawn skeletons, haunted attractions, and being stalked by a man wearing a bleached William Shatner mask.
NIS2 Compliance: Get Ready for the EU's Latest Cybersecurity Directive
Are you familiar with NIS2? If your organization operates within the European Union (EU), you’re likely already preparing for its impact. But if it’s not yet on your radar, it’s crucial to understand this new directive and how it will affect your cybersecurity strategy.
A Non-Sports Nerd Talks About the Importance of the Olympics and Why Other Nerds Should Care
The Olympics’ official website has published an entire page on what you need to know about cybersecurity and the Olympic games. It’s an excellent primer for those less technically inclined to understand how they can protect themselves digitally and still have fun watching people throw disks at each other.
It's been a wild ride since Object First Ootbi launched on February 14th, 2023. Over the last year, we've added many new customers and grown tremendously as a company, more than doubling in size, securing Veeam backup data from ransomware. Here's a quick look back at how far we've come and what's new with Ootbi.
In blog #2 of this series, we delved into the central principles of the Zero Trust Data Resilience (ZTDR) model: segmentation, multiple data resilience zones, and immutable backup storage. This model and architecture, a collaborative effort between Veeam and Numberline Security, extends CISA’s Zero Trust principles and Maturity Model to the enterprise data backup and recovery use case.
In blog #1 of this series, we have outlined Zero Trust principles and introduced the new Zero Trust Data Resilience (ZTDR) model. The ZTDR model and architecture have been developed in collaboration between Veeam and Numberline Security. It extends the tenets of CISA’s Zero Trust Maturity Model with the following principles that cover enterprise data backup and recovery.
Time to update your passwords again, it's world password day
Let’s be real here: passwords are dying. In the olden days, you could get by with 2-3 memorable passwords and brute-force your brain to figure out how to get into your MySpace account without fear of being locked out, and that was still pretty secure.
Zero Trust and Enterprise Data Backup and Recovery
The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security.
3 Ways to Improve Recovery Rates on World Backup Day
This year, I wanted to enhance some of the tips I shared last year and mix some spicy new ones to help all backup-minded individuals find the peace of mind they deserve. Consider this blog an amendment to the previous World Backup Day constitution.
Simplicity, on the other hand, can be a powerful tool in enhancing data center security. A simpler system is easier to understand, monitor, and secure. It reduces the number of potential attack vectors and makes it easier to spot anomalies.
Here are some ways simplicity can be incorporated into data center security.