Cohesity – Digital IT News https://digitalitnews.com IT news, trends and viewpoints for a digital world Tue, 22 Oct 2024 20:23:02 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.16 Cohesity Announces New AI Enhancements for Visual Data Explorer https://digitalitnews.com/cohesity-announces-new-ai-enhancements-for-visual-data-explorer/ Tue, 22 Oct 2024 13:30:09 +0000 https://digitalitnews.com/?p=12365 Cohesity has unveiled a patent-pending visual data exploration feature as part of Cohesity Gaia, its AI-powered search assistant introduced earlier this year. This new capability visually categorizes themes across documents and files within a data set, offering fresh context to the data. The visual data explorer also suggests queries, helping users gain insights more quickly. [...]

The post Cohesity Announces New AI Enhancements for Visual Data Explorer appeared first on Digital IT News.

]]>
Cohesity has unveiled a patent-pending visual data exploration feature as part of Cohesity Gaia, its AI-powered search assistant introduced earlier this year. This new capability visually categorizes themes across documents and files within a data set, offering fresh context to the data. The visual data explorer also suggests queries, helping users gain insights more quickly.

With traditional approaches, enterprises often struggle to gain insights across unstructured data and text. This challenge only grows as the amount of unstructured data increases. With unstructured data representing more than 80 percent of all corporate data, companies are often forced to run queries and compile reports based on a small subset of data—the information stored in structured systems. As a result, reports and analyses may be incomplete or inaccurate, with valuable insight still locked inside disparate unstructured systems.

Cohesity Gaia brings the power of generative AI to enterprise data, dramatically improving the speed and quality of insights available for a variety of use cases. The solution indexes and provides insight based on data stored in many popular formats, including emails, documents, PDFs, text files, spreadsheets, HTML, XML, and presentations.

Gain Insights Faster with Auto-Generated Themes and Topics for Thousands of Documents

One of the biggest challenges users face when working with vast datasets is having access to data but not knowing where to begin or what valuable insights can be retrieved. Cohesity Gaia overcomes this by automatically providing a visual representation of the data, sorted by themes, giving users a clear starting point. The new visual explorer uses topic modeling, a set of advanced AI techniques with natural language processing, to instantly identify hidden thematic structures across documents and files. This deep insight and context into the nature of the data offers a framework for better understanding, empowering users to ask more informed and targeted questions as they search.

The Gaia visual data explorer further simplifies this process by allowing users to click through each theme, ask conversational questions, and interact with intelligent, context-aware prompts to quickly find the most relevant information. Aligned with Cohesity’s responsible AI commitment, Gaia gives customers insight into their data while keeping it secure and compliant with regulatory requirements.

Cohesity will host a series of AI workshops to give customers and prospects a hands-on look at the first-of-its-kind visual data explorer and learn more about how Cohesity Gaia can help unlock new insights from their business. For more information on the AI workshops, visit our website.

“By addressing the challenge of managing and extracting insights from unstructured data across disparate systems, Cohesity Gaia and its new visual data explorer have the potential to revolutionize data accessibility for enterprises,” said Chirag Mehta, Principal Cybersecurity Analyst with Constellation Research. “This innovation not only could enhance data security and compliance but could also empower business users of enterprise customers with deeper, more contextual insights, significantly benefiting the decision-making process and operational efficiency.”

Access Vast Amounts of Data Stored in Sharepoint and NAS environments with Generative AI

Cohesity has also expanded support for new workloads and data sources within Gaia. Cohesity customers can now analyze corporate data protected on the Cohesity platform from Microsoft 365 Mail, Microsoft 365 Sharepoint, and Microsoft 365 OneDrive, as well as on-prem or cloud-based file servers, including popular systems like Dell EMC Isilon, Netapp NAS, physical file servers, and Cohesity Smartfiles.

The new visual data explorer feature in Cohesity Gaia visually maps customers’ data sets based on semantic indexing and creates a list of suggested questions and queries, illustrated here using test data.

To learn more about Cohesity Gaia visual data explorer, visit the website here.

Related News:

Cohesity Integrates with Crowdstrike to Level the Playing Field

Cohesity Data Cloud Updates and GenAI Detection and Recovery

The post Cohesity Announces New AI Enhancements for Visual Data Explorer appeared first on Digital IT News.

]]>
Cohesity Integrates with Crowdstrike to Level the Playing Field https://digitalitnews.com/cohesity-integrates-with-crowdstrike-to-level-the-playing-field/ Thu, 12 Sep 2024 14:00:51 +0000 https://digitalitnews.com/?p=12019 Cohesity announced an expanded strategic partnership with CrowdStrike to enhance threat detection and response. This collaboration integrates Cohesity’s advanced data protection with CrowdStrike’s leading threat intelligence, establishing a new benchmark for comprehensive cybersecurity in backup and recovery solutions. According to CrowdStrike’s 2024 Global Threat Report, adversaries have shifted to more effective tactics, such as credential harvesting [...]

The post Cohesity Integrates with Crowdstrike to Level the Playing Field appeared first on Digital IT News.

]]>
Cohesity announced an expanded strategic partnership with CrowdStrike to enhance threat detection and response. This collaboration integrates Cohesity’s advanced data protection with CrowdStrike’s leading threat intelligence, establishing a new benchmark for comprehensive cybersecurity in backup and recovery solutions.

According to CrowdStrike’s 2024 Global Threat Report, adversaries have shifted to more effective tactics, such as credential harvesting and exploiting vulnerabilities, bypassing legacy defenses while using AI and other advanced technologies to rapidly evolve their techniques. Through the latest integration between Cohesity Data Cloud with CrowdStrike Falcon Adversary Intelligence, the partnership is leveling the playing field against sophisticated cyber threats.

Cohesity’s data protection solution, combined with CrowdStrike’s industry-leading threat intel feeds, which tracks over 250 adversaries and incorporates indicators of compromise (IOCs), enables mutual customers to identify the latest threats in their backup copies with higher fidelity and accuracy. The powerful combination offers greater visibility into the attack by providing the latest intelligence on emerging threats while minimizing the attackers’ advantages. Threat hunting on Cohesity backup copies allows customers to investigate stealthily and passively so that adversaries or containment or response activities do not impact investigations.

By implementing Cohesity’s clean room design and integrated tooling, customers gain specialized forensic capabilities to analyze malware, investigate breaches, and understand attack vectors without risking contamination of their broader IT environment.

“Elevating your organization’s threat detection and response is crucial in today’s threat environment, especially with AI at the disposal of cyber adversaries,” said Craig Martell, Chief Technology Officer, Cohesity. “Secondary data estates offer a perfect opportunity for minimizing attackers’ advantages and, together with CrowdStrike, our customers can enhance their threat hunting and response and automate defenses across their security stack.”

Cohesity is focused on bringing together the best of the security industry, allowing customers to choose the right solutions for them without sacrificing functionality or adding complexity. This flexibility allows for a more tailored security posture that can adapt to emerging threats and changes in the IT environment.

“Our continued partnership with Cohesity and latest joint efforts reflect our shared commitment to cyber resilience,” said Daniel Bernard, chief business officer, CrowdStrike. “To stay ahead, enterprises benefit from streamlining threat intelligence and response efforts while also harnessing their vast secondary data to gain security insights. This integration provides the technology and intelligence they need to reduce risk.”

By partnering with industry leaders like CrowdStrike, Cohesity solutions can better safeguard organizations’ digital assets in today’s dynamic threat environment. For more information on this new Cohesity integration with CrowdStrike, visit the website here.

Related News:

Cohesity Data Cloud Updates and GenAI Detection and Recovery

How to Prevent a CrowdStrike IT Outage Repeat

The post Cohesity Integrates with Crowdstrike to Level the Playing Field appeared first on Digital IT News.

]]>
Cyber Resilience Strategy Found Overestimated Research Finds https://digitalitnews.com/cyber-resilience-strategy-found-overestimated-research-finds/ Thu, 15 Aug 2024 17:00:33 +0000 https://digitalitnews.com/?p=11741 Cohesity’s cyber resilience research reveals that organizations overestimate their cyber resilience capabilities, leading to major business disruptions and ransom payments. The Cohesity Global Cyber Resilience Report 2024, based on a survey of over 3,100 IT and security decision-makers across eight countries(1), shows that cyberattacks, particularly ransomware, are escalating. Most respondents experienced a ransomware attack in [...]

The post Cyber Resilience Strategy Found Overestimated Research Finds appeared first on Digital IT News.

]]>
Cohesity’s cyber resilience research reveals that organizations overestimate their cyber resilience capabilities, leading to major business disruptions and ransom payments. The Cohesity Global Cyber Resilience Report 2024, based on a survey of over 3,100 IT and security decision-makers across eight countries(1), shows that cyberattacks, particularly ransomware, are escalating. Most respondents experienced a ransomware attack in the past six months and have paid a ransom within the last year. Additionally, many anticipate a growing threat of cyberattacks to their industry in 2024 compared to 2023.

According to respondents, companies’ cyber resilience strategies are holding up against a worsening cyber threat landscape, with close to 4 in 5 (78%) respondents saying they have confidence in their company’s cyber resilience strategy and its ability to ‘address today’s escalating cyber challenges and threats’.(2) At the same time, over 2 in 3 (67%) respondents revealed they had been the ‘victim of a ransomware attack’ in 2024; 96% said the threat of cyberattacks to their industry would increase or had increased this year, with close to 3 in 5 (59%) saying it had or will increase by over 50% compared to 2023.

Organizations Are Paying Ransoms & Breaking ‘Do Not Pay’ Policies
However, despite the majority of respondents saying they were ‘mostly confident’ or had ‘complete confidence’ in their organization’s cyber resilience strategy, only 6% of respondents said their company would not pay a ransom to recover data and restore business processes, or do so faster, with 83% saying they would(3). In fact, 3 in 4 (75%) respondents globally said their company would be willing to pay over US$1 million in ransoms to recover data and restore business processes, and over 1 in 5 (22%) said their company would be willing to pay over US$5 million.

Concerningly, close to 7 in 10 (69%) respondents said their organization had paid a ransom in the last year, before being surveyed, despite 77% saying their company had a ‘do not pay’ policy. The more than 2100 respondents, who have paid a ransom, said they had paid ransoms(4)  in the past year totaling:

  • 37% have paid ransom(s) between US$1 – US$249,999
  • 23% have paid ransom(s) between US$250,000 – US$499,999
  • 23% have paid ransom(s) between US$500,000 – US$999,999
  • 12% have paid ransom(s) between US$1,000,000 – US$2,999,999
  • 6% have paid ransom(s) between US$3,000,000 – US$9,999,999
  • 0.33% (7 respondents) have paid ransom(s) between US$10,000,000 – US$25,000,000

“The reality for organizations is that destructive cyberattacks, like ransomware, are a ‘when’ not ‘if’ reality that threatens their business continuity. However, organizations can tackle this reality head-on by enhancing their cyber resilience – the ability to rapidly respond and recover from cyberattacks or traditional business continuity scenarios – by adopting modern data security, response, and recovery capabilities,” said Brian Spanswick, CISO and CIO, Cohesity. “Organizations may have the greatest confidence in their cyber resilience, both in their strategy and capabilities, but the reality is that the majority are paying ransoms or would pay a ransom, so organizations are overconfident or overestimate their cyber resilience.”

Companies’ Confidence In Cyber Resilience Doesn’t Match Recovery & Restoration Realities

Cyber resilience is the technology backbone for business continuity. Cyber resilience defines companies’ ability to recover their data and restore business processes when they suffer a cyberattack. However, cyber resilience remains a challenge that threatens business continuity, according to respondents:

  • Only 2% of respondents said they could recover data & restore business processes within 24 hours
  • 18% said their company could recover data and restore business processes within 1-3 days
  • 32% said they could recover and restore in 4 to 6 days, while 31% would need 1-2 weeks
  • Almost 1 in 6 (16%) need over three weeks to recover data and restore business processes

Conversely, when asked what their organization’s ‘targeted optimum recovery time objectives (RTO) to minimize business impact in the event of a cyberattack or incident of compromise’ was, 98% of respondents said their target was within one day, despite only 2% saying they could recover data and restore business processes within this same period. Almost 1 in 2 (45%) said their targeted optimum RTO was within two hours.

Customers and consumers expect consistent continuity of operations or services, which is why effective cyber resilience is vital. Yet, only 2% said their organizations’ tolerance to disruption of business continuity and downtime due to a cyberattack or data breach was within 24 hours. In fact, 31% of respondents said their business’ tolerance for downtime was between 1-3 days, 53% said up to 4-6 days, and 12% said more than a week. Interestingly, almost 1 in 2 (49%) respondents said they had stress-tested their ‘data security, data management, and data recovery processes or solutions’, by simulating a response to a cyber event or data breach, in the past six months.

Zero Trust Security & Data Privacy Remains A Challenge Despite Enhanced Regulations & Legislation

Over half (54%) of respondents said their ‘centralized visibility’ of critical data between IT & Security could be improved to detect anomalies and determine sensitive data exposure or breaches. When asked about their data access control measures to align with zero trust security principles, barely more than half of companies had deployed multi-factor authentication, and less than half had deployed features requiring multiple approvals before changes to data or role-based access controls:

  • Multi-factor Authentication (MFA): 52%
  • Quorum Controls or Administrative Rules requiring multiple approvals: 49%
  • Role-Based Access Control (RBAC): 46%

“The most vital element of cyber resilience is the ability to recover business-critical data that restores key business processes. But you can’t restore critical data if you don’t secure it first from external or internal threats. This starts with deploying effective data access controls like multi-factor authentication (MFA) and role-based access controls (RBAC),” said Brian Spanswick, CISO and CIO, Cohesity. “The fact that almost 1 in 2 organizations are not implementing these controls to protect sensitive data is alarming and demonstrates a significant risk to an organization’s cyber resilience. Especially given that everyday consumers and end-users are often – and rightly – required to have MFA enabled to secure their account credentials, with MFA also an important defense measure against AI-based attack techniques.”

Despite governments and public institutions going to great lengths to encourage more robust cybersecurity, data protection, and data privacy measures, only 42% of respondents said they had all the IT & Security technology capabilities to identify sensitive data and comply with applicable data privacy laws and regulations. Yet, 79% of respondents also said that ‘advanced threat detection, data isolation, and data classification were vital’ to their organization’s qualification for cyber insurance or to secure discounts on their cyber insurance policies.

When asked ‘What, if any, industries and/or sectors do you think are most impacted by cyberattacks?’, respondents selected these as the ‘Top 7’ industries or sectors most impacted(5):

Globally:

  1. IT & Technology – 40%
  2. Banking & Wealth Management – 27%
  3. Financial Services (including insurance companies) – 27%
  4. Telecommunications & Media (including streaming services) – 24%
  5. Government & Public Services – 23%
  6. Utilities (including Water, Electricity, Gas, and other energy services companies) – 21%
  7. Manufacturing – 21%

AI A Plus & Minus In Managing Escalating Cyber Threats

According to respondents, organizations must now contend with AI-based cyberattacks or cyber threats, with 4 in 5 (80%) respondents saying they had responded to what they believe to be AI-based attacks or threats within the last 12 months. Of those respondents who said: “Yes”, 82% said they had the ‘necessary AI-powered solutions to counter and respond to these attacks.’ Of the 18% who said they had not responded to AI-based cyberattacks or cyber threats in the past year, less than half (49%) said they have the ‘necessary AI-powered solutions to counter and respond to these attacks’, over a third (36%) said they do not, and close to 1 in 7 (15%) said they were unsure.

“Cyber resilience is critical because the incentive and motivation of attackers is so high, with attack surfaces incredibly vast, so a reliance on protective controls is unrealistic,” said Brian Spanswick, CISO and CIO, Cohesity. “Successful cyberattacks and data breaches severely disrupt business continuity, impacting revenue, reputation, and customer trust. This risk must be at the forefront of business leaders’ priorities, not just IT and Security leaders. Similarly, regulation and legislation should not be seen by companies as the ‘ceiling,’ but instead the ‘floor,’ in both developing cyber resilience and adopting data security or recovery capabilities.”

About the survey:
The findings are based on a survey of 3139 IT & Security decision-makers (split as close to 50:50 as possible) commissioned by Cohesity and conducted by Censuswide between 27.06.2024 – 18.07.2024. The top five industries that respondents selected as best representing their company’s operations were IT & Telecommunications, Manufacturing, Financial Services (incl. Insurance), Banking & Wealth Management, and Hospitals & Healthcare. Censuswide abides by and employs the Market Research Society members, follows the MRS code of conduct and ESOMAR principles, and is a member of the British Polling Council.

Learn more about how Cohesity can improve your cyber resilience strategy and data security at the website here.

Related News:

Cohesity Data Cloud Updates and GenAI Detection and Recovery

AMD EPYC CPU-Powered Solutions Offers Cohesity Customers More Choices

(1) Respondents were polled in: Australia, France, Germany, Japan, Malaysia, Singapore, the United Kingdom, and the United States.
(2) Respondents were provided with the NIST definition of cyber resiliency at the start of the survey: “The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources. Cyber resiliency is intended to enable mission or business objectives that depend on cyber resources to be achieved in a contested cyber environment.”
(3) 11% said ‘maybe, depending on the ransom amount.’
(4) Respondents were asked to select the ransom amount they had paid with the last year, or if they had paid multiple ransoms to select the total amount of the ransoms they had paid.
(5) Respondents were asked to select their ‘Top 7. This is why the percentage figures total over 100% for this data set.

The post Cyber Resilience Strategy Found Overestimated Research Finds appeared first on Digital IT News.

]]>
Cohesity Data Cloud Updates and GenAI Detection and Recovery https://digitalitnews.com/cohesity-data-cloud-updates-and-genai-detection-and-recovery/ Tue, 30 Jul 2024 17:30:28 +0000 https://digitalitnews.com/?p=11591 Cohesity has strengthened its first-mover advantage in GenAI detection and recovery with major upgrades to the Cohesity Data Cloud. These enhancements enable customers to leverage Cohesity’s built-in AI features to quickly detect, investigate, and respond to potential threats, allowing for faster operational recovery. The updates include advancements in threat detection, data security posture, and a [...]

The post Cohesity Data Cloud Updates and GenAI Detection and Recovery appeared first on Digital IT News.

]]>
Cohesity has strengthened its first-mover advantage in GenAI detection and recovery with major upgrades to the Cohesity Data Cloud. These enhancements enable customers to leverage Cohesity’s built-in AI features to quickly detect, investigate, and respond to potential threats, allowing for faster operational recovery. The updates include advancements in threat detection, data security posture, and a cyber recovery assistant tool, along with a new clean room design environment. These tools offer a guided incident response wizard, helping customers move from alert to recovery with confidence and efficiency. This builds on the earlier release of Cohesity Gaia, the RAG-based AI solution introduced in February.

As cyber threats such as ransomware continue to proliferate, organizations are handicapped by a lack of expertise in responding to these threats. According to the World Economic Forum’s 2024 Global Cybersecurity Outlook, 36% of executives said that skills gaps are the main challenge they face in achieving their cyber-resilience goals. The Cohesity Data Cloud updates solve a very real and vexing industry challenge: constrained by IT budgets and cybersecurity expertise shortages, organizations need comprehensive data security, management, and recovery solutions that simplify the process of identifying actionable threats and events, mitigating issues, and recovering quickly from incidents.

To aid these customers, Cohesity enhanced its AI-powered cyber recovery assistant tool for the Cohesity Data Cloud, providing expert guidance on the appropriate response. Using security context as input to GenAI and complementing this multiple sources including threat hunting scans, ransomware detection, data risk and posture, among others, customers can receive an alert to anomalous behaviors. They are then able to have a conversation to assess the impact of the anomaly and correlate events, and get direction on the right next steps on investigation and any remediation that could be needed–all from within the wizard without the need for specialized cyber response expertise. This expert guidance helps give customers a better understanding of the anomaly and its impact and enables them to engage the Security Operations team with confidence for a timely incident response so companies can quickly return to normal business operations.

“Threat actors are increasingly relying on AI to not only create more sophisticated attacks, but to also increase their volume drastically,” said Craig Martell, Chief Technology Officer, Cohesity. “We’re giving our customers the tools to fight fire with fire, helping them take on these threats to their environment and move on from them quickly, ensuring business goes on as usual. The enhanced cyber recovery assistant and clean room design will make our customers more resilient, and we’re continuing to innovate more responsible, AI-powered capabilities to the Cohesity Data Cloud.”

Cohesity’s clean room design provides a trusted and proven foundation that speeds incident recovery and augments investigations by Security Operations teams while minimizing the risk of secondary attacks. The modular design helps isolate the attack or breach within minutes and provides several native capabilities to support the SecOps team’s needs in the clean room investigation. Cohesity Data Cloud’s threat-hunting capability provides incident responders with a curated feed, helping the organization understand the adversary’s techniques throughout the attack’s lifecycle, interacting with engineers in real-time and real-language. DataProtect delivers rapid access to system snapshots over the incident timeline, allowing forensic analysis of filesystems and evidence collection. With a better understanding of the incident’s full scope, teams can mitigate threats faster, allowing customers to return to normal business as quickly as possible.

 “We’re always looking for new opportunities to bolster our cyber resilience and ensure we’re well-prepared to endure threats that are only growing in volume and sophistication,” said Tim Fleming, Director of Technology Services, Forsyth County Schools. “Cohesity is constantly innovating and giving us new tools to secure and manage our data. That’s why we believe they’re the perfect partner to help simplify and optimize our security operations so we can stay focused on what matters to our district: driving value for our students.”

The cyber recovery assistant and clean room design are available in the Cohesity Data Cloud.

To learn more about Cohesity Data Cloud, visit the website here.

Related News:

AMD EPYC CPU-Powered Solutions Offers Cohesity Customers More Choices

Confidential Computing Capabilities with Cohesity and Intel Collaboration

The post Cohesity Data Cloud Updates and GenAI Detection and Recovery appeared first on Digital IT News.

]]>
AMD EPYC CPU-Powered Solutions Offers Cohesity Customers More Choices https://digitalitnews.com/amd-epyc-cpu-powered-solutions-offers-cohesity-customers-more-choices/ Wed, 05 Jun 2024 17:15:04 +0000 https://digitalitnews.com/?p=11004 As companies continue to generate increasing volumes of data, it’s critical they manage and secure that data properly. Organizations face many challenges, from ransomware and other cyberattacks to stringent regulatory requirements, IT constraints, tight budgets, and tough economic conditions. To solve these challenges, companies need to take advantage of technology that is best suited to [...]

The post AMD EPYC CPU-Powered Solutions Offers Cohesity Customers More Choices appeared first on Digital IT News.

]]>
As companies continue to generate increasing volumes of data, it’s critical they manage and secure that data properly. Organizations face many challenges, from ransomware and other cyberattacks to stringent regulatory requirements, IT constraints, tight budgets, and tough economic conditions. To solve these challenges, companies need to take advantage of technology that is best suited to their specific requirements.
Cohesity has announced that its Cohesity Data Cloud now supports AMD EPYC CPU-powered servers, providing customers with additional choices for modern data security and management. Customers can now deploy and operate Cohesity Data Cloud on AMD EPYC CPU-based all-flash and hybrid servers from Dell, Hewlett Packard Enterprise (HPE), and Lenovo.

“Customers each have unique needs but a common goal – securing and gaining insight from their data. They trust Cohesity, in part, because we strive to offer the largest ecosystem with the most choices to suit their preferences,” said John Davidson, group vice president, Americas Sales, Cohesity. “By supporting AMD EPYC CPU-powered servers, we’re opening up new options for our customers to customize and modernize their data center, increasing performance and delivering energy, space, and cost savings so they can execute their data security and management strategy on their preferred hardware configurations.”

All-flash servers have become an increasingly popular choice for organizations with high-demand applications and workloads, stringent power budgets for their data centers, or increasing storage capacity requirements and little physical space within their data center. Leveraging the performance, cost efficiency, and energy efficiency of AMD EPYC CPUs, Cohesity now delivers compelling AMD-powered all-flash servers from HPE to modernize customer data centers and meet the requirements of green initiatives through the greater density, performance, and cost savings all-flash servers provide over traditional servers. Single-socket 1U HPE servers based on AMD EPYC can reduce the number of required nodes and power costs by up to 33% when compared with dual-socket 2U servers based on other CPUs. Additionally, through the HPE Secure Supply Chain, Cohesity’s software is preloaded at the factory, reducing deployment and increasing the security of the overall solution.

“Businesses increasingly demand more from their data centers to meet their business needs —more performance, more energy efficiency, more cost savings,” said Kumaran Siva, corporate vice president, Strategic Market Development, AMD. “AMD is uniquely positioned to help meet the demands of the modern data center while enabling technology partners, like Cohesity, to deliver business critical applications like their AI-powered data security and management capabilities.”

Cohesity’s AI-powered data security and management capabilities are now generally available on AMD-powered all-flash servers from HPE and hybrid servers from Dell and Lenovo.

Learn more about Cohesity Data Cloud supporting AMD EPYC CPU-powered servers by reading the blog: “Revamping Your Data Centers with Cohesity on HPE Next-Gen Compute, Powered by AMD” here.

Related News:

Confidential Computing Capabilities with Cohesity and Intel Collaboration

Cohesity DataProtect Integration with Microsoft 365 Brings Enhanced Security

The post AMD EPYC CPU-Powered Solutions Offers Cohesity Customers More Choices appeared first on Digital IT News.

]]>
Dr. Martell Appointed as Cohesity’s Chief Technology Officer https://digitalitnews.com/dr-martell-appointed-as-cohesitys-chief-technology-officer/ Mon, 13 May 2024 17:00:17 +0000 https://digitalitnews.com/?p=10787 Cohesity has appointed Dr. Craig Martell as its Chief Technology Officer. In this position, Dr. Martell will leverage his extensive industry knowledge to steer the company’s technical direction. He will integrate prevailing and emerging industry and customer insights to define and implement a strategic and impactful roadmap that ensures Cohesity’s future success. Dr. Martell brings [...]

The post Dr. Martell Appointed as Cohesity’s Chief Technology Officer appeared first on Digital IT News.

]]>
Cohesity has appointed Dr. Craig Martell as its Chief Technology Officer. In this position, Dr. Martell will leverage his extensive industry knowledge to steer the company’s technical direction. He will integrate prevailing and emerging industry and customer insights to define and implement a strategic and impactful roadmap that ensures Cohesity’s future success.

Dr. Martell brings extensive industry and public sector experience and unprecedented expertise in artificial intelligence (AI) and machine learning, leading AI programs for top tech companies since 2013. Dr. Martell most recently served as the Chief Digital and Artificial Intelligence Officer (CDAO) for the U.S. Department of Defense (DoD). In this role, he served as the senior official responsible for accelerating the adoption of data, analytics, digital solutions, and AI functions to generate decision advantage across the department – expertly guiding the DoD through a quickly-changing AI industry. With Dr. Martell as its first leader, the CDAO office was created to elevate digital and AI strategy development and policy formulation while ensuring the unity of mission and tighter integration for the department’s enterprise-wide data, AI, and cyber organizations.

Prior to joining the DoD, Dr. Martell held several senior roles at some of the most recognizable technology companies. At Lyft, he served as Head of Machine Learning, where he designed and built a state-of-the-art Machine Learning (ML) Platform, allowing the Lyft engineering team to quickly create and ship ML models using large-scale, new, and ongoing statistical programs. From 2018 to 2020, Dr. Martell was Head of Machine Intelligence at Dropbox, responsible for all machine learning, including overall vision-setting, drawing from analytics as applied to ML, and clear, concise communication of ML strategy across the organization. Before then, he led a number of AI teams and market-moving initiatives at LinkedIn. Dr. Martell was also a tenured computer science professor at the Naval Postgraduate School specializing in natural language processing. Dr. Martell’s proficiency in statistical principles and methodologies has been demonstrated in his several patents, including a Hybrid Classification System in 2021 and System and Method for Encrypting Data in Pictorial Data in 2008.

“The speed and scale Cohesity has achieved over the last several years is a testament to the incredible technology platform the company has built at the junction of multi-cloud, security and AI for the future of data protection. My role will be to accelerate the innovation internally and the advocacy externally of Cohesity’s AI-powered innovations that are second to none,” said Dr. Martell. “I’m honored to join Sanjay and the talented team he has put together as we accelerate the company’s course to advance AI and machine learning capabilities critical to addressing key challenges to enterprise data.”

“AI represents a massive competitive opportunity and advantage for Cohesity. Our launch of Cohesity Gaia – with its first-to-market, patent-pending innovations – was the first step in our strategy,” said Sanjay Poonen, president and CEO, Cohesity. “Attracting and hiring an industry pioneer of Craig’s caliber – someone who has been driving an agenda of responsible AI at the highest levels of both public and private sector organizations – rounds out our strong executive leadership team with expertise across security, multicloud, and AI. I expect that Craig’s experience and vision for Cohesity’s AI roadmap will accelerate our lead in this critical area of our business.”

To learn more about Dr. Martell and the Cohesity Executive Team, visit the website here.

Related News:

Confidential Computing Capabilities with Cohesity and Intel Collaboration

Cohesity DataProtect Integration with Microsoft 365 Brings Enhanced Security

The post Dr. Martell Appointed as Cohesity’s Chief Technology Officer appeared first on Digital IT News.

]]>
Confidential Computing Capabilities with Cohesity and Intel Collaboration https://digitalitnews.com/confidential-computing-capabilities-with-cohesity-and-intel-collaboration/ Thu, 11 Apr 2024 17:30:44 +0000 https://digitalitnews.com/?p=10545 Cohesity has announced a partnership with Intel to integrate Intel’s confidential computing capabilities into the Cohesity Data Cloud. By combining this technology with Cohesity’s renowned cyber vault service, Fort Knox, they introduce a groundbreaking data-in-use encryption solution, marking a pioneering advancement in the data management industry. Together, Cohesity and Intel are solving one of the [...]

The post Confidential Computing Capabilities with Cohesity and Intel Collaboration appeared first on Digital IT News.

]]>
Cohesity has announced a partnership with Intel to integrate Intel’s confidential computing capabilities into the Cohesity Data Cloud. By combining this technology with Cohesity’s renowned cyber vault service, Fort Knox, they introduce a groundbreaking data-in-use encryption solution, marking a pioneering advancement in the data management industry.

Together, Cohesity and Intel are solving one of the most pressing cybersecurity challenges for CIOs. Traditionally, options have been limited for protecting data in use while it is actively processed in memory, which can leave data unencrypted and vulnerable to insider attacks. Confidential computing enabled by Intel® Software Guard Extensions (Intel® SGX) will support Cohesity customers to reduce the risk posed by potential bad actors accessing data while it is being processed in main memory. This is especially critical for highly regulated industries like financial institutions, healthcare, and government.

Cohesity’s flagship platform, Cohesity Data Cloud, has long included many proven and cutting-edge technologies to help the world’s largest organizations manage and secure their most critical data from cyber criminals. Cohesity and Intel are joining forces to reduce customers’ risk of cyber threat by:

  • Creating a unique solution that will protect encryption keys that secure customer data in a hardware-secured environment leveraging Intel SGX for confidential computing in the cloud.
  • This solution dramatically reduces the risk posed by data exfiltration, as the data is not viewable or downloadable by any privileged accounts when the data is being processed in memory as it is encrypted.
  • Providing a way for Cohesity customers to verify that their Intel SGX is legitimate by using Intel® Trust Authority, which has the latest patches and only runs the dedicated Cohesity application before extracting the data encryption key.

“We are relentlessly focused on innovation that furthers our mission: To protect, secure, and provide insights into the world’s data. Collaborations with the biggest and most trusted names in tech, like Intel, are the reason why the largest global enterprises rely on us to strengthen their business resilience,” said Sanjay Poonen, CEO and President of Cohesity. “With Intel SGX, Intel Trust Authority, and confidential computing, our customers will benefit from reduced risk and increased security in cloud environments, allowing them to focus on what really matters, their business.”

“Intel is a pioneer and leader in data center confidential computing technologies, enabling customers, especially those handling sensitive or highly regulated data, to address their needs of confidentiality, integrity, and attestation for their workloads,” said Greg Lavender, executive vice president and chief technology officer at Intel Corporation. “Cohesity’s adoption of our technology reflects the growing customer need to protect critical data in the cloud and advances our common goal of delivering a secure computing environment combined with the trust customers expect.”

Read more about how Intel and Cohesity use confidential computing to protect secondary data in this blog.

The post Confidential Computing Capabilities with Cohesity and Intel Collaboration appeared first on Digital IT News.

]]>
Cyberattacks Compel Companies to Pay Ransoms, Breaking their ‘Do Not Pay’ Policies https://digitalitnews.com/cyberattacks-compel-companies-to-pay-ransoms-breaking-their-do-not-pay-policies/ Wed, 31 Jan 2024 18:00:43 +0000 https://digitalitnews.com/?p=10005 A study conducted by Cohesity indicates that prevalent cyberattacks are compelling a majority of companies to pay ransoms and disregard their ‘do not pay’ policies. The research, based on responses from over 900 IT and Security decision-makers, underscores the prevailing notion that companies are operating in an environment where cyberattacks are not a matter of [...]

The post Cyberattacks Compel Companies to Pay Ransoms, Breaking their ‘Do Not Pay’ Policies appeared first on Digital IT News.

]]>
A study conducted by Cohesity indicates that prevalent cyberattacks are compelling a majority of companies to pay ransoms and disregard their ‘do not pay’ policies. The research, based on responses from over 900 IT and Security decision-makers, underscores the prevailing notion that companies are operating in an environment where cyberattacks are not a matter of ‘if’ but ‘when.’ Notably, a significant portion of surveyed companies has paid ransoms in the past two years, and the majority anticipates a substantial increase in the threat of cyberattacks in 2024 compared to 2023. The situation is exacerbated by deficiencies in data recovery capabilities.

Alarmingly, close to 8 in 10 (79%) respondents said their company had been the ‘victim of a ransomware attack’ between June and December. The cyber threat landscape is expected to get even worse in 2024, with 96% of respondents saying the threat of cyberattacks to their industry will increase this year and over 7 in 10 (71%) predicting it will increase by more than 50%.

Organizations’ attack surfaces are informed by the size and scope of their data environments. However, 78% of respondents said their data security risk has now increased faster than the growth in the data they manage. Respondents also believe organizations’ cyber resilience and data security strategies are not keeping up with the current threat landscape, with just 21% having full confidence in their company’s cyber resilience strategy and its ability to ‘address today’s escalating cyber challenges and threats’.(1)

Slow Data Recovery & Lack of Cyber Resilience Results Ransom Payments

Cyber resilience is the technology backbone for business continuity. It defines companies’ ability to recover their data and restore business processes when they suffer a cyberattack or adverse IT event. However, according to respondents, every company has cyber resilience and business continuity challenges:

  • All respondents said they need over 24 hours to recover data and restore business processes
  • Just 7% said their company could recover data and restore business processes within 1-3 days
  • 35% said they could recover and restore in 4 to 6 days, while 34% need 1-2 weeks
  • Alarmingly, almost 1 in 4 (23%) need over 3 weeks to recover data and restore business processes

Further demonstrating cyber resilience gaps, just 12% said their company had stress-tested their data security, data management, and data recovery processes or solutions in the six months prior to being surveyed, and 46% had not tested their processes or solutions in over 12 months.

Unsurprisingly, 94% of respondents said their company would pay a ransom to recover data and restore business processes, while 5% said ‘maybe, depending on the ransom amount.’ More than 2 in 3 (67%) said their company would be willing to pay over $3 million to recover data and restore business processes, with 35% of respondents saying their company would be willing to pay over $5 million. The research also showed the importance of being able to respond and recover, as 9 in 10 said their organization had paid a ransom in the prior two years, despite 84% saying their company had a ‘do not pay’ policy.

“Organizations can’t control the increasing volume, frequency, or sophistication of cyberattacks such as ransomware. What they can control is their cyber resilience, which is the ability to rapidly respond and recover from cyberattacks or IT failures by adopting modern data security capabilities,” said Brian Spanswick, chief information security officer and head of IT, Cohesity. “It is no surprise that the majority of companies have been hit by cyberattacks like ransomware. What is alarming is that 90% have paid a ransom, breaking their ‘do not pay’ policies, and most are willing to pay over $3 million in ransoms because they can’t recover their data and restore business processes or do so fast enough.”

Executive Management Should Be Accountable & Aligned

Respondents identified executive awareness and responsibility for data security as two areas for companies to improve, with just 35% saying their senior and executive management fully understands the ‘serious risks and daily challenges of protecting, securing, managing, backing up, and recovering data.’ Four in five said executive management (C-Level) and boards should share the responsibility for their company’s data security strategy, while 67% said their company’s CIO and CISO, in particular, could be better aligned.

Prioritizing their biggest concerns about a successful data breach or cyberattack, respondents selected brand and reputational damage (34%), a drop in share price / investment / profitability (31%), a direct hit to revenue (30%), and a loss of stakeholder trust (30%). When asked who is most impacted by a data breach or cyberattack, respondents said existing customers (29%), the Security team (29%), the IT team (28%), employees (28%), and their third-party partners (27%) were most impacted.

“Cyber resilience and data security should be a holistic organizational priority because the use of data and technology occurs in every function by every employee. The severe impact of a successful cyberattack or data breach on business continuity, revenue, brand reputation, and trust is enough to keep all business, IT, and Security leaders awake at night,” said Sanjay Poonen, CEO and president of Cohesity. “To rapidly respond to cyberattacks, organizations need modern AI-powered data security and management solutions that protect their data, detect when it is under attack, and recover it as fast as possible to restore their business processes.”

Regulation Isn’t Driving Companies’ Cyber Resilience & Data Security Best Practices

Despite governments and public institutions going to great lengths to encourage stronger cybersecurity and data management, only 46% of respondents said government initiatives, legislation, and regulations are actually driving their companies’ data security, data management, or data recovery initiatives. Of these respondents that said specific government initiatives, legislation, and regulations are driving their data security, management, and recovery approaches, 2 in 3 named these as the most influential:

United States:

  1. California Consumer Privacy Act
    Federal Trade Commission Act of 1914
  2. Department of Defense’s Cyber Security Maturity Model Certification (CMMC)
    Digital Millennium Copyright Act of 1998 (DMCA)
    Sarbanes-Oxley Act of 2002
  3. California Privacy Rights Act of 2020 (CPRA)

Australia:

  1. Privacy Act 1988
  2. Digital Transformation Agency Guidelines
  3. Office of the Australian Information Commissioner’s Notifiable Data Breach (NDB) Scheme

United Kingdom:

  1. National Data Strategy (NDS)
  2. Consumer Data Right (CDR)
  3. Data Protection Act 2018
    UK Cloud Security Principles

“It may seem surprising that 54% say government efforts and policies aren’t driving their companies’ data security, management, and recovery initiatives. However, organizations should not be centering their entire data security, risk, management, or recovery strategy around a set standard or compliance framework,” said Spanswick. “Organizations should certainly adhere to legislation, regulation, and standards, but these should be seen as the floor and not the ceiling. The security risks to a company’s data and operations should be what drives their data management, security, and recovery practices.”

About the survey:
The findings are based on a survey of 902 IT and Security decision-makers (split as close to 50:50 as possible) commissioned by Cohesity and conducted by Censuswide. Survey respondents were polled from businesses in Australia, the United Kingdom, and the United States. The top five industries selected by respondents as best representing the industry their company operates in were: IT & Telecommunications, Finance, Healthcare, Finance, HR, and Manufacturing & Utilities.

Learn how to reduce the threat of cyberattacks with Cohesity’s intelligent data security and management solutions.

Related News:

Cohesity DataProtect Integration with Microsoft 365 Brings Enhanced Security

Cyber Resilience and Data Recovery are Lacking According to Cohesity Research

1Respondents were provided with the NIST definition of cyber resiliency at the start of the survey: “The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources. Cyber resiliency is intended to enable mission or business objectives that depend on cyber resources to be achieved in a contested cyber environment.”

The post Cyberattacks Compel Companies to Pay Ransoms, Breaking their ‘Do Not Pay’ Policies appeared first on Digital IT News.

]]>
Cohesity DataProtect Integration with Microsoft 365 Brings Enhanced Security https://digitalitnews.com/cohesity-dataprotect-integration-with-microsoft-365-brings-enhanced-security/ Fri, 17 Nov 2023 13:30:49 +0000 https://digitalitnews.com/?p=9464 At Microsoft Ignite 2023, Cohesity revealed an expanded collaboration with Microsoft, aiming to assist organizations in promptly responding to and recovering from data loss within Microsoft 365 environments. For years, Cohesity and Microsoft have offered solutions for high-speed backup and recovery. This includes recent AI and cloud security integrations announced earlier this year across Microsoft environments, [...]

The post Cohesity DataProtect Integration with Microsoft 365 Brings Enhanced Security appeared first on Digital IT News.

]]>
At Microsoft Ignite 2023, Cohesity revealed an expanded collaboration with Microsoft, aiming to assist organizations in promptly responding to and recovering from data loss within Microsoft 365 environments. For years, Cohesity and Microsoft have offered solutions for high-speed backup and recovery. This includes recent AI and cloud security integrations announced earlier this year across Microsoft environments, from Microsoft Azure to Microsoft 365.

With this expanded collaboration, Cohesity is working with Microsoft to deliver enhanced backup and recovery performance for Microsoft 365 environments via the integration of native APIs of Microsoft 365 Backup Storage with Cohesity DataProtect. Cohesity DataProtect is a high-performance, secure backup and recovery solution that safeguards data against sophisticated cyber threats. It offers comprehensive, policy-based protection for cloud-native, SaaS, and traditional data sources. As one of the top workloads secured and managed by Cohesity DataProtect, enterprises worldwide trust Cohesity to secure and protect their Microsoft 365 data.

“93% of organizations say that the threat of ransomware has grown significantly in 2023, making it particularly important to protect data across cloud environments,” said Sanjay Poonen, CEO and President of Cohesity. “With this integration between Cohesity DataProtect and Microsoft 365 Backup Storage, our joint customers will benefit from faster data restore capabilities in the context of their Microsoft 365 configuration and access policies.”

“Microsoft 365 Backup Storage provides high-speed point-in-time recovery for data stored in Microsoft 365 environments so customers can react and respond to the latest cybersecurity threats confidently,” said Jeff Teper, President, Collaboration Apps and Platform, Microsoft. “We are pleased that Cohesity is working with us to bring high-speed Microsoft 365 backup and recovery operations to Cohesity DataProtect, as customers will gain reduced time to backup and restore data, stronger posture for audits and compliance, and greater data and business resiliency.”

Microsoft customers can benefit from the following through the integration between Microsoft 365 Backup Storage and Cohesity DataProtect:

  • Seamless, high-speed data protection and management: With this integration, customers can simplify data protection, recovery, and storage across on-prem and cloud environments by seamlessly connecting their Cohesity infrastructure to Microsoft 365 Backup Storage, Through this, they can ensure their data remains accessible, protected, and easily recoverable to help meet strict Recovery Time Objectives and Recovery Point Objectives.
  • Compliance and governance: By combining Cohesity’s robust data backup and recovery capabilities with Microsoft 365 Backup Storage’s compliance features, organizations can remain compliant with data governance regulations – particularly crucial for industries with strict regulatory requirements.
  • Single pane of glass: Cohesity supports backup and recovery for on-prem, cloud-native, and SaaS workloads, all managed through a single control plane, making it easier to protect enterprise data at scale regardless of where it resides.
  • AI-based data security features: Users can benefit from early access to integration between Cohesity Turing – an expanding set of AI capabilities that power deep AI-driven insights – and Azure OpenAI Service. This allows organizations to use generative AI to bring more significant insights and power to their data security and protection strategies.

 

Learn more about Cohesity’s collaboration with Microsoft.

Related News:

ControlUp Enhances Microsoft-Powered Experiences with New Features

Cyber Resilience and Data Recovery are Lacking According to Cohesity Research

The post Cohesity DataProtect Integration with Microsoft 365 Brings Enhanced Security appeared first on Digital IT News.

]]>
Cyber Resilience and Data Recovery are Lacking According to Cohesity Research https://digitalitnews.com/cyber-resilience-and-data-recovery-are-lacking-according-to-cohesity-research/ Thu, 27 Jul 2023 13:00:08 +0000 https://digitalitnews.com/?p=8550 Cohesity commissioned new research revealing the majority of businesses do not have the necessary cyber resilience strategies or data security capabilities required to address today’s escalating cyber threats and maintain business continuity. Furthermore, their cyber resilience efforts are not keeping pace with cyber threats, with data security and recovery technology deficiencies reducing cyber insurance eligibility [...]

The post Cyber Resilience and Data Recovery are Lacking According to Cohesity Research appeared first on Digital IT News.

]]>
Cohesity commissioned new research revealing the majority of businesses do not have the necessary cyber resilience strategies or data security capabilities required to address today’s escalating cyber threats and maintain business continuity. Furthermore, their cyber resilience efforts are not keeping pace with cyber threats, with data security and recovery technology deficiencies reducing cyber insurance eligibility and increasing the fallout of a successful attack.

In comparing the cybersecurity outlook for 2023 to 2022, 93% of respondents said they felt the threat of ransomware attacks to their industry had increased in 2023. Alarmingly, almost half of respondents (45%) confirmed their business had been the victim of a ransomware attack in the prior six months. Respondents also revealed that their business’ cyber resilience and data security capabilities have not kept pace, with 80% expressing concerns about their organization’s cyber resilience strategy and whether it can ‘address today’s escalating cyber challenges and threats’[1].

Business continuity is critical even when adverse cyber events arise, however, businesses are slow to respond because they lack the capability to recover data and restore business processes quickly. When asked how long their organization would take to recover data and business processes if a cyberattack occurred? Over 95% of respondents revealed their business would need over 24 hours, 71% said it would take more than 4 days, while a fourth (41%) of respondents said over a week would be required.

Unsurprisingly, two-thirds respondents (67%) lack full confidence that their company could recover their data and critical business processes in the event of a system-wide cyberattack. Diving deeper into cyber resilience and data recovery expectations versus reality, 90% of respondents said their business would consider paying a ransom, with close to 3 in 4 (74%) saying ‘Yes’ their organization would pay, if it meant being able to recover data and business processes, or recover faster.

“Companies cannot afford to be offline and unable to maintain operations, especially for more than a day. However, the stark reality is that many organizations are vulnerable to leverage from cyber criminals because they are incapable of rapidly recovering their data and business processes when necessary,” said Brian Spanswick, chief information security officer and head of IT, Cohesity. “Therefore, it’s no surprise that 9 in 10 respondents said their business would consider paying a ransom to maintain continuity.”

When asked about the biggest barriers to their organization being able to get back up and running in the event of a successful cyberattack, respondents said their top three challenges were integration between IT and security systems (34%), a lack of coordination between IT and security (33%) and antiquated backup and recovery systems (32%). Further clarity was provided by respondents regarding their ability to secure their data estates, with less than half stating they are confident all their data stored in the cloud (44%) or at the edge (42%) is secure and protected, and less than 3 in 10 (28%) are confident data stored on-premises is secure and protected.

“IT and SecOps must co-own organizations’ cyber resilience outcomes to identify sensitive data and protect, detect, respond, and recover from cyberattacks,” said Spanswick. “Relying on traditional backup and recovery systems, which lack modern data security capabilities, in today’s sophisticated cyber threat landscape is a recipe for disaster. Instead, organizations should seek out data security and management platforms that integrate with their existing cybersecurity solutions and provide visibility into their security posture and improve cyber resilience.”

“It’s not a surprise that over half of organizations still struggle with securing data in the cloud. The reality is most organization’s data is scattered across different environments and varies by type,” said Tyler Young, CISO of BigID. “That’s why solutions like BigID that enable organizations to know and control their data become ever more critical.”

Consequently, 87% of respondents said that to help win the war against ransomware, data and cybersecurity vendors must collaborate to provide complete and integrated anti-ransomware solutions, and 9 in 10 respondents feel their business would benefit from a data security and management platform that provides insights on their overall security posture and cyber resilience.

“The only way to achieve cyber resilience is by prioritizing proactive security measures that will prevent cyberattacks in the first place,” said Ray Komar, vice president of technology and cloud alliances, Tenable. “This approach should also extend to backup and recovery measures to ensure business continuity in the event of a cybersecurity incident. This requires organizations to not only manage their cyber risk, but better understand their exposure to risk by leveraging vulnerability and exposure data to make informed decisions on remediation efforts.”

This is especially urgent given that adequate data backup and recovery services are critical to have in order to qualify for cyber insurance – and not all solutions are created equal. While almost 3 in 4 (74%) respondents confirmed their company has cyber insurance, close to half (46%) of all respondents said it is now harder to obtain cyber insurance than it was in 2020. Respondents also shared the three most critical technologies or capabilities required to secure cyber insurance are: “strong encryption” (40%), the “ability to verify the integrity of backups” (38%) and MFA (37%) as their top needs.

About the survey:
The findings are based on a survey of 3,409 IT and Security Operations (SecOps) decision-makers (split as close to 50:50 between the two groups as possible) commissioned by Cohesity, Tenable, and BigID, and conducted by Censuswide with results shared in late April 2023. Survey respondents were polled from businesses in Australia, France, Germany, Japan, New Zealand, the United Kingdom, and the United States.

To learn more about Cohesity, visit the website HERE. To read Cohesity’s 2023 State of Data Security & Management Report, please click HERE.

[1] Respondents were provided with the NIST definition of cyber resiliency at the beginning of the survey: The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources. Cyber resiliency is intended to enable mission or business objectives that depend on cyber resources to be achieved in a contested cyber environment.

The post Cyber Resilience and Data Recovery are Lacking According to Cohesity Research appeared first on Digital IT News.

]]>