The guide – co-authored by Continuity’s CTO – provides an overview of the evolution of storage technology, recent security threats, and the risks they pose.
Get a comprehensive set of recommendations for the secure deployment, configuration, and operation of storage resources.
These include data and confidentiality protection using encryption, isolation and restoration assurance.
What you’ll learn:
- Back to basics of storage & backup infrastructure
- Threats, risks and attack surfaces
- How to securely deploy, configure and operate storage resources
- The best way to build a program to manage storage infrastructure risks and integrate it with existing cybersecurity frameworks