Tag: Security

[PODCAST] Veeam User Group France #1

Hi! Thank you for coming in a great number 3 weeks ago to Veeam User Group France #1 event focused on Backup Architectures secure by design and Security. I had the opportunity to participate in a live podcast in French with Yoann Castillo (Team Lead Systems Engineering @Veeam), and Eric Machabert (CISO & CTO @Maincare …

Continue reading

Advertisement

Log4J 2.17.0 is published

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 did not protect from uncontrolled recursion from self-referential lookups. When the logging configuration uses a non-default Pattern Layout with a Context Lookup (for example, $${ctx:loginId}), attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup, resulting in a StackOverflowError …

Continue reading

Advertisement

LTO9 and Air Gap with Quantum Active Vault

LTO-9 is now generally available, increasing native media capacity to 18TB and bringing 400 MB/s transfer rates. Aside from increased density this technology apparently improves reliability: BaFe (Barium Ferrite) LTO-9 tapes are rated to maintain stable magnetic characteristics for over 50 years. How the latest innovations in LTO technology are addressing today’s most pressing data …

Continue reading

Advertisement

[REPLAY] Arrow and Veeam Talk Show 2021

Hi! Thank you for coming in a great number last week to Arrow Talk Show event focused on Cloud and Digital Transformation. I had the opportunity to participate in a live show in French with Veeam Software, Arrow and, Aviti, talking about: Cloud, Digital Transformation, Data Protection and Security. Watch the recording of the live …

Continue reading

Level up your Microsoft Office 365 Security

Last year, I had the opportunity to participate in a live session in French as official Varonis Speaker about Microsoft 365 Security (Varonis Elite member) at aOS Nice 2020 with Mickaël Lopes (Cyber Security Pre Sales Engineer @ Varonis). We are seeing an uptick in adversaries using a very tricky Man-in-the-Middle (MitM) attack to bypass …

Continue reading

error

Enjoy this blog? Please spread the word :)