
Keep up with the latest news.
The Future of Backup: IssProtect DevOps for Flexible Kubernetes Solutions
Learn how IssProtect DevOps offers flexible backup solutions for Kubernetes and containerised environments. Stay agile and secure with modern backup strategies.
The new era of Ransomware, Targeting kubernetes.
Explore how ransomware is targeting Kubernetes environments and learn effective strategies for securing containerised workloads with backup solutions and security best practices.
Don't see NIS2 and DORA as a problem, it is there to help!
Understand how NIS2 and DORA regulations help enhance data protection and cybersecurity. Learn why these standards can strengthen your business resilience.
Get started with protecting your Containers
Learn how to protect container workloads from security threats. Explore the best practices for securing your containers and ensuring business continuity.
My life as DevBackOps
Discover what it's like to be a DevBackOps consultant, helping clients secure their container and cloud workloads from potential disasters and ransomware attacks.
Safeguarding Business Continuity: The Crucial Role of Early Ransomware Detection in Backup Environments
Learn why early ransomware detection is vital to safeguarding business continuity and preventing data loss in backup environments.
Why should we protect container workload
Explore the importance of securing container workloads to prevent vulnerabilities and ensure smooth business operations.
True Air-Gap is a good alternative to prevent ransomware.
True air-gap strategies offer an effective way to prevent ransomware attacks by isolating backup data. Learn why this method is essential for your cybersecurity.
Enable Multi People Authentication helps you to protect your data
Enable multi-factor authentication (MFA) for enhanced data protection and prevent unauthorised access to your critical business data.
Will Immutable Storage solve all Cyber Attacks and be NIS2 compliant?
Learn how immutable storage can prevent data manipulation and help you comply with NIS2 standards to protect against cyber threats.
IBM Storage Protect Operations Center REST API + Python
Discover how to use IBM Storage Protect Operations Center with Python to automate and enhance your data protection processes using the REST API.
Is Retention Lock a good option to implement?
Understand the benefits of implementing retention lock as part of your data security strategy to prevent accidental or malicious data deletion.
Why use MFA for your Backup Application
Discover why MFA should be implemented for your backup application to ensure that your data remains protected against unauthorised access.
Stärk ditt företags digitala försvar mot hot i den digitala eran
Learn strategies for fortifying your company’s digital defense against cyber threats in today’s increasingly digital business landscape.
Backup måste bli företagens plan A
Backup should be a priority for every business. Explore why having a comprehensive backup strategy is essential for safeguarding data and ensuring business continuity.
Create your own AWS S3 Glazer Storage
Learn how to set up your own S3 Glacier storage on-premises using IBM technology, enhancing your data backup and archiving capabilities.
Protect Google Workspace
Learn how to secure your Google Workspace by implementing cloud-native tools for ransomware scanning and data protection.
Kickstart BackupAsCode with ChatGPT
Explore how using ChatGPT can help you automate Backup-as-Code and prepare your IT infrastructure to prevent ransomware attacks.
Summery from AWS re:invent
Catch up on the major announcements and trends discussed at AWS re:Invent 2022, including new technologies and best practices for cloud computing.
Reflection on SSUG Nov 2022
A reflection on the Swedish Spectrum User Group event in November 2022, covering everything from Backup-as-Code to Quantum Qubits in IT.