August 2025

Meet our newest AWS Heroes — August 2025

We are excited to announce the latest cohort of AWS Heroes, recognized for their exceptional contributions and technical leadership. These passionate individuals represent diverse regions and technical specialties, demonstrating notable expertise and dedication to knowledge sharing within the AWS community. From AI and machine learning to serverless architectures and security, our new Heroes showcase the …

Meet our newest AWS Heroes — August 2025 Read More »

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Today marks an exciting step forward for Veeam and our customers, as Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, …

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy Read More »

AWS Weekly Roundup: OpenAI models, Automated Reasoning checks, Amazon EVS, and more (August 11, 2025)

AWS Summits in the northern hemisphere have mostly concluded but the fun and learning hasn’t yet stopped for those of us in other parts of the globe. The community, customers, partners, and colleagues enjoyed a day of learning and networking last week at the AWS Summit Mexico City and the AWS Summit Jakarta. Last week’s …

AWS Weekly Roundup: OpenAI models, Automated Reasoning checks, Amazon EVS, and more (August 11, 2025) Read More »

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges

Key Takeaways: Understanding the difference between vendor lock-in and lock-out is essential for data control: Lock-in can restrict flexibility and innovation, while lock-out can result in sudden loss of access to critical data or services. Both pose real risks to long-term data strategy. Portability and vendor flexibility are key to future-proofing your data management: Choosing …

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges Read More »

How Higher Education Institutions Can Strengthen Cyber Resilience with Modern Data Protection

Education sector IT teams are facing unprecedented cybersecurity threats and compliance demands. For colleges and universities, cyber resilience is the ability to withstand, recover from, and adapt to cyberattacks and IT disruptions, without losing access to critical systems and data. Working closely with higher education institutions across the country, I’ve seen just how dramatically the …

How Higher Education Institutions Can Strengthen Cyber Resilience with Modern Data Protection Read More »

Locking Down Public-Sector Data: My Perspective on Why Veeam Data Cloud Vault Sets the New Standard

As director of public sector sales for Veeam in the U.S., I spend my days talking with state agencies, county CIOs, school districts, and federal program managers who are under relentless pressure. Ransomware actors see public services as soft targets, compliance mandates tighten every budget cycle, and legacy infrastructure isn’t aging gracefully. When 911 dispatch, …

Locking Down Public-Sector Data: My Perspective on Why Veeam Data Cloud Vault Sets the New Standard Read More »

Safeguarding Public Sector Data: Veeam’s Blueprint for SLED Resilience

In my role at Veeam, I have the privilege of working closely with state, local, and education (SLED) organizations across the U.S. Every day, I hear first-hand the challenges IT teams face including tight budgets, aging infrastructure, rising cyberthreats, and the constant pressure to meet compliance mandates. It’s not easy. In fact, with 87% of …

Safeguarding Public Sector Data: Veeam’s Blueprint for SLED Resilience Read More »

Key 2025 Compliance Updates You Should Know

Key Takeaways Mandatory reporting is now standard. New regulations like DORA, NIS2, and HIPAA updates require organizations to report cyber incidents—sometimes within just 72 hours—to maintain transparency and avoid penalties. 72-hour incident response windows are achievable, but only with preparation. Meeting tight timelines demands documented IR plans, defined workflows, cross-functional coordination, and automated detection tools. …

Key 2025 Compliance Updates You Should Know Read More »

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

What if you paid the ransom and your data was still destroyed? For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal …

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak Read More »

Driving Enterprise Efficiency: VMWare Rightsizing Powered by Veeam ONE and Pure1

In today’s enterprise IT landscape, organizations are challenged to maximize performance, control costs and drive efficiencies across their virtual environments.  Additionally, migrating to a new hypervisor is a complex and costly process. It involves much more than simply replacing software—it demands thorough planning and significant investment across multiple areas, such as: Feature set and functionality …

Driving Enterprise Efficiency: VMWare Rightsizing Powered by Veeam ONE and Pure1 Read More »

Scroll to Top