Category: Data Protection

  • Power of PowerProtect Data Manager

    PowerProtect Data Manager Hey, are you struggling with management of data and the larger infrastructure data center(s)? PowerProtect Data Manager (PPDM) as a great solution for Kubernetes, virtual machines (VMs), cloud apps, and Windows/Linux filesystem. PPDM is a powerful and universal software-defined data protection solution changing the IT landscape. Backup…

  • CyberTalks Episode 4 – Zero Trust

    Welcome to our CyberTalks’ podcast. Today, we have Bob Plankers and Dale McKay from the VMware team. Dale and Bob talk with us about Zero Trust and NIST NCCoE standards. They inform us on how Zero Trust is applied in the vSphere, Carbon Black, and NSX security. Since Zero Trust…

  • CyberTalks Episode 3 – Threat Modeling

    Welcome to our latest CyberTalks’ episode. Today, Marshal Savage, a Distinguished Dell Engineer, will be joining us today to discuss Threat Modeling. Threat Modeling is fundamental to cybersecurity and addresses how to counter cyber-attacks. We asked Marshal questions like “What is Threat Modeling?”, “What are Common Threat Modeling Methodologies?”, and…

  • Data Privacy? Data Protection?

    What’s the difference? I’m sure you have heard or used the terms data privacy and data protection. The two terms data privacy and data protection are often used interchangeably. However, there is an important difference between the two terms that you may not know or fully understand. To keep it…

  • CyberTalks Episode 2 – What is Secure Component Verification (SCV)?

    Welcome to CyberTalks’ second podcast episode! Today, Adam Cook will be joining us to discuss Secure Component Verification (SCV). We’re excited to hear the answers to questions like, “What is secure component verification?,” “How does it work?,” and “What are the benefits of secure component verification?” Since Secure Component Verification…

  • Danger: Ransomware Attacks

    If you have read some of my blogs before, you probably remember me talking about ransomware. If you haven’t, check out Data Protection Security PT. 3 – Cyber Attacks, I talked about the different types of cyber-attacks and talked briefly about ransomware. However, considering the number of ransomware attacks that…

  • CyberTalks Episode 1 – The White House Executive Order: Cybersecurity Initiative

    Thank you for joining us on CyberTalks’ first episode. In the first episode, we will White House Executive Order Cybersecurity Initiative. We have Joann Kent joining us to talk about the initiative and we’ll ask her some question to get a better understanding of the executive order. Some topics we…

  • Welcome to CyberTalks

    Welcome to the CyberTalks Podcast! Your host, Sevan Woods, and Co-Host ,Shakita DennisChain, wanted to take a minute to introduce ourselves and to say thank you for tuning in. We are excited to partner up and discuss what is happening in the cyber world. We promise to bring amazing and…

  • PowerProtect Cyber Recovery

    What is Cyberspace? Cyberspace refers to the virtual computer world, more specifically, an electronic medium used to facilitate online communication. It typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to assist in communication and data exchange activities. The term cyberspace was…

  • Data Protection Security PT. 3 – Cyber Attacks

    Oh, great your back! Let’s continue with our data protection security series by talking about different types of cyber-attacks. What is a cyber-attack? A cyber-attack is when an organization or individual intentionally and maliciously attempt to breach the information system of another organization or individual. The main goal for somebody…