Veeam Blog
Filters (Results: 41)
Results: 41
Filters (Results: 41)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Not All Data Resilience Frameworks Are Equal: Why the Veeam Data Resilience Maturity Model (DRMM) Sets the Industry Standard

As more frameworks enter the market under the label of “resilience,” it is important to distinguish between surface-level checklists and models that help organizations change. Most are narrow in scope, focused on isolated capabilities like cyber recovery or backup maturity. Read more
Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Why You Need to Cover Your SaaS

In today’s fast-paced digital landscape, businesses are constantly seeking new ways to enhance efficiency and reduce costs. One of the most significant innovations in recent years has been the rise of Software as a Service (SaaS). According to Gartner Research’s latest forecast, worldwide SaaS spending has grown 20% to a staggering $247.2 billion in 2024, and it is expected to approach nearly $300 billion by the end of 2025. Read more

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

Top 5 TTPs Targeting Enterprise Cybersecurity

As enterprises continue to strengthen their security tactics, threat actors are continuously refining their methods to sidestep them. In 2024, advanced tactics, techniques, and procedures (TTPs) evolved significantly, shaping the threat landscape with greater efficiency and effectiveness. These advancements have intensified enterprise cybersecurity threats, making proactive defense strategies more critical than ever.

With the dust now settled, let’s look at the TTPs most frequently leveraged against enterprises, which proved most impactful, and how enterprises can detect these threats before it’s too late.

TTPs Targeting Enterprises Today

1. Exfiltration

The concept behind data extortion attacks is straightforward: steal sensitive data and use it as ransom leverage. Threat actors have evolved beyond traditional encryption-based attacks, finding new avenues ... Read more

Raymond Umerley
Raymond Umerley

Field CISO

Crafting an Effective Incident Response Plan

No organization is immune to cyberthreats. 75% of organizations experienced at least one ransomware attack in 2023, meaning having a robust Incident Response Plan (IRP) is no longer optional  — it’s a necessity. An incident response plan acts as your organization's defense playbook, ensuring a swift, coordinated response to mitigate damage, minimize downtime, and protect sensitive data. Read more