Category

cyber-security

Maturity Model: How Compliance Drives Data Resilience

Part of the Cobalt Iron blog series If you’re responsible for keeping your organization’s data protected, resilient, and recoverable, then you know that maintaining a modern backup and recovery...

November 20, 2025

Cyber Security, Cloud Backup, Hybrid Cloud Data Protection

UPDATED: Locking Down Your Backup Environment to Protect It From Ransomware

One need only glance at the news on any given day to see that security breaches and ransomware attacks are on the rise all over the world ... and the threats are only getting more sophisticated. If...

November 17, 2025

Cyber Security

Modern IBM i Backup: 7 Key Features That Simplify, Secure, and Scale

Part of the Cobalt Iron blog series IBM i systems have long been trusted for their reliability and performance in enterprise environments. But as IT infrastructures evolve toward hybrid cloud models...

October 23, 2025

Cyber Security, Cloud Backup, Hybrid Cloud Data Protection

Beyond Backup: Building Cyber Resilience for IBM i in a Zero Trust Era

IBM i has long been celebrated for its reliability, performance, and unique features. Its architecture offers inherent advantages that have made it a trusted platform for mission-critical workloads...

September 2, 2025

Cyber Security, Cloud Backup

How to Cloud Responsibly™: A Strategic Guide to Secure, Scalable, and Smart Cloud Backup

Cloud adoption continues to accelerate across industries, promising agility, scalability, and cost savings. Yet, beneath the surface of this IT (Infrastructure Technology) transformation,...

July 24, 2025

Cyber Security, Cloud Backup

Cobalt Iron Compass Is the Key to Business Continuity for IBM Power VS Workloads

Cobalt Iron’s Greg Tevis, an expert in IBM workloads, recently spoke with Meera Rangarajan, IBM program director and worldwide Power-as-a-Service product manager, and Joe Cropper, an IBM...

June 12, 2025

Cyber Security, Cloud Backup, Hybrid Cloud Data Protection

Securing Your Last Line of Defense — Part 3: Cyber Attack Monitoring, Detection, Analytics, and Remediation for Backup

A Blog Series - Part 3: Cyber Attack Monitoring, Detection, Analytics, and Remediation for Backup In this blog series, we’ve been talking about all the factors that go into making sure your backup...

May 1, 2025

Cyber Security, Smart Data Protection

Securing Your Last Line of Defense — Part 2: Backup Data Security

A Blog Series - Part 2: Backup Data Security It’s no exaggeration to say that a data breach could ruin your business — thus emphasizing the need for comprehensive security measures in backup...

April 8, 2025

Cyber Security, Smart Data Protection

Securing Your Last Line of Defense — Part 1: Backup Environment Access Considerations

A Blog Series - Part 1: Backup Environment Access Considerations The threat of cyber crime is everywhere, and too often, the perpetrators succeed. Even the most security-hardened organizations can...

March 20, 2025

Cyber Security, Smart Data Protection

Safeguarding Your Business: Introducing Secure Automated Backup with Compass for IBM Power Virtual Server

Authors: Lucas Conforti (Product Manager, IBM), Andy Hurt (CMO, Cobalt Iron) & Val Besong (Product Marketing, IBM) Imagine waking up one morning to find your company's critical data compromised or...

November 7, 2024

Cyber Security, Cloud Backup, Hybrid Cloud Protection