Skip links

Tag: sled

Padlock in blue

Implementing a Secure Approach in a Zero Trust World

The Origins of Zero Trust If you keep pace with cybersecurity trends, you have undoubtedly heard the term “zero trust” with increasing frequency in recent years. The term, first coined by Forrester analyst John Kindervag in 2010, and popularized by Palo Alto Networks in years since, refers to a

Why Acronis SCS?

Why Acronis SCS? While our products may look similar to our parent company Acronis AIG, Acronis SCS is an independently operated, US-based organization with 100% US citizens and support. Here at Acronis SCS, the US public sector is our #1 priority – in fact, it
Holiday Party Blog Featured Image

The Year in Review: 2019 Highlights

Looking Inward Instilling Core Values As we usher in a new decade – along with all the excitement and growth that will undoubtedly come with it – there’s no better time for reflection. And 2019 has been quite the year for Acronis SCS. When 2019
Cactuscon Blog Featured Image

The Upshot: CactusCon 2019

Why Go? Last weekend, a fellow colleague of mine at Acronis SCS and I had the opportunity to attend Arizona’s premier security conference, CactusCon, in neighboring Mesa. The annual event, which began in 2012 and is now the largest conference of its kind in the
Critical Infrastructure is Vulnerable Blog Featured Image

Let’s Face It – America’s Critical Infrastructure Is Vulnerable

A Troubling Reality There’s no denying it. In today’s increasingly complex digital landscape, America’s critical infrastructure is more vulnerable than ever to cyber exploitation and attack. It doesn’t help that many of the organizations (both public and private) under the critical infrastructure umbrella lack the
Lock Blog Featured Image

Newly Launched Software Changes the Backup & Disaster Recovery Game

Purpose Built for Air Gapped Environments In the backup and recovery software market, there is a troubling gap for US public sector customers  operating in ‘no internet’ environments, including Department of Defense weapons testing sites, development labs / centers, training simulators, deployed tactical elements and
National Security Demands Blog Featured Image

National Security Demands Stronger Cybersecurity

A Thanksgiving State-of-Mind As families across America prepare to gather around the dinner table and nurse some turkey and pumpkin pie-induced food comas in the coming days, our country has much to appreciate. This time of year provides a welcome opportunity to remember the unique
DoDIN APL Certification Blog Featured Image

The DoDIN APL Certification: A Labor of Love

As the Department of Defense (DoD) and other US federal agencies seek to better protect themselves from pervasive and growing cyber threats, how can they maintain a security-oriented mindset when sourcing commercial off the shelf (COTS) products from outside vendors for use on sensitive networks?
blue chain link

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This