Veeam Blog
Filters (Results: 1474)
Results: 1474
Filters (Results: 1474)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam is More+. Achieve complete data resilience with Veeam.

At Veeam, we’ve redefined data resilience for the modern enterprise. While we are known as the pioneer for virtualization backup, Veeam is so much more. Veeam Data Platform is your all-in-one data resilience solution, integrating data protection, threat detection, cyber protection, observability, AI, incident response and the world’s fastest, most trusted recoveries. Read more

Recon Scanner Detects Malicious Activity & Prevents Cyberattack

Local governments, just like any private organization, rely heavily on digital infrastructure for nearly every aspect of operation — from managing tax systems to safeguarding financial records and online services. This reliance however added to restricted IT and security budgets makes them prime targets for cyberattacks. Read more

Elevate Your Cloud Game With Veeam

Cloud adoption is at an all-time high, with nearly 98% of businesses utilizing cloud services in some capacity. This trend continues to grow as organizations store, process, and manage vast amounts of critical data in the cloud. Read more
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

Top 5 TTPs Targeting Enterprise Cybersecurity

As enterprises continue to strengthen their security tactics, threat actors are continuously refining their methods to sidestep them. In 2024, advanced tactics, techniques, and procedures (TTPs) evolved significantly, shaping the threat landscape with greater efficiency and effectiveness. These advancements have intensified enterprise cybersecurity threats, making proactive defense strategies more critical than ever.

With the dust now settled, let’s look at the TTPs most frequently leveraged against enterprises, which proved most impactful, and how enterprises can detect these threats before it’s too late.

TTPs Targeting Enterprises Today

1. Exfiltration

The concept behind data extortion attacks is straightforward: steal sensitive data and use it as ransom leverage. Threat actors have evolved beyond traditional encryption-based attacks, finding new avenues ... Read more

Raymond Umerley
Raymond Umerley

Field CISO

Building Cyber Resilience in Educational Organizations

Building cyber resilience within educational organizations is imperative to protect sensitive student, faculty, and research data and ensure operational continuity. Academic institutions are shifting toward complex, hybrid, and multi-cloud architectures, making them more susceptible to cyber threats like phishing and ransomware. Read more