258 episodes

Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware.  

The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from.  His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others.

A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe.  That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware.  If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you. 

The Backup Wrap-Up W. Curtis Preston (Mr. Backup)

    • Technology

Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware.  

The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from.  His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others.

A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe.  That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware.  If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you. 

    Ransomware 101: What is ransomware?

    Ransomware 101: What is ransomware?

    This episode about what is ransomware is the first in a new series on the topic. The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltration and direct attacks on backup systems. Our conversation highlights the importance of prevention and detection measures, such as robust access controls, limiting internet-facing systems, and monitoring for data exfiltration. We also emphasize the critical role of backup and recovery strategies, including offline and immutable backups, in mitigating the impact of ransomware attacks. Throughout the episode, we provide insights into the complex ransomware threat landscape and offer practical advice for organizations looking to protect their data and systems from this ever-evolving threat.

    • 35 min
    XDR vs SIEM: Do you need to choose?

    XDR vs SIEM: Do you need to choose?

    In this episode, we explore the differences between XDR and SIEM, two crucial tools in the world of security monitoring. Our guest, Dez Rock, CEO of SIEMonster, shares her fascinating journey from professional hacker to building an affordable, scalable SIEM solution that encompasses SOAR and XDR capabilities. We discuss the importance of evaluating security tools based on their true capabilities rather than just market perception, and Dez provides real-world examples of how SIEMonster's SIEM/XDR tool automatically detected and shut down a ransomware attack at a large hospital client. Tune in to learn about the evolving security landscape, the pros and cons of XDR vs SIEM, and how you may not have to choose! Whether you're an IT professional or simply interested in the latest cybersecurity trends, this episode offers valuable insights into the future of security monitoring.

    • 44 min
    Strengthening Your Cybersecurity Blue Team: Pro Tips

    Strengthening Your Cybersecurity Blue Team: Pro Tips

    In this episode, we explore the essential strategies and best practices for building and optimizing a blue team cybersecurity approach. Our guest, Mike Saylor, shares his expertise on how organizations can effectively prepare for and respond to cyber incidents. From establishing relationships with law enforcement to conducting tabletop exercises and understanding cyber insurance policies, Mike provides valuable insights to help companies strengthen their cybersecurity posture.
    Throughout the episode, we discuss the importance of focusing on detection and response capabilities, not just prevention, and how a well-prepared blue team can make all the difference in the face of a cyber threat. Mike also shares real-world stories that illustrate the key lessons and takeaways for organizations looking to enhance their cybersecurity efforts. Tune in to learn how you can better protect your company from cyber threats with a robust blue team approach.

    • 51 min
    Thinking Like a Hacker: Red Team Cyber Security Strategies

    Thinking Like a Hacker: Red Team Cyber Security Strategies

    In this popular episode from last year, we explore the fascinating world of red team cyber security with Dwayne Laflotte, a seasoned expert in offensive cybersecurity. Dwayne shares his wealth of knowledge and experience, diving into the tactics and strategies employed by red teams to identify vulnerabilities and strengthen an organization's defenses. From exploiting backup systems to the importance of least privilege and strong passwords, this episode is a must-listen for anyone interested in bolstering their cybersecurity posture.
    Dwayne provides captivating examples of how red team cyber security professionals think outside the box to breach networks, emphasizing the need for constant vigilance and adaptability in the face of evolving threats. He also highlights the critical role of collaboration between red and blue teams, stressing the importance of a multi-layered approach to cybersecurity. Packed with practical insights and actionable advice, this episode is an invaluable resource for IT professionals and business leaders alike.

    • 56 min
    Google Cloud Disaster Recovery: Lessons from UniSuper's Close Call

    Google Cloud Disaster Recovery: Lessons from UniSuper's Close Call

    In this episode, we delve into the critical importance of Google Cloud disaster recovery planning through the lens of UniSuper's recent brush with catastrophe. When Google accidentally deleted UniSuper's entire VMware environment, the Australian pension provider faced the terrifying prospect of losing access to $125 billion in assets and the data of over 600,000 members.
    Hosts W. Curtis Preston and Prasanna Malaiyandi dissect the incident, highlighting how UniSuper's adherence to the 3-2-1 backup rule and use of third-party backup solutions ultimately saved the day. They explore the key lessons learned from this Google Cloud disaster, including the importance of having isolated data copies, clear communication during outages, and a robust recovery strategy. This real-world case study serves as a stark reminder of the risks associated with relying solely on cloud providers for data protection and the necessity of comprehensive Google Cloud disaster recovery planning.

    • 31 min
    Electronic Discovery tools that extract from backups

    Electronic Discovery tools that extract from backups

    In this episode, we explore the world of electronic discovery tools and how they're transforming the legal landscape. Our guest, Brendan Sullivan, shares his expertise on the challenges companies face when dealing with legacy data and the importance of using the right tools for eDiscovery. Learn how purpose-built software can greatly enhance efficiency, accuracy, and defensibility in the eDiscovery process. Brendan also discusses the growing need for data remediation and migration services, as well as the role of computer forensics and eDiscovery platforms in building strong legal cases. Whether you're a legal professional looking to streamline your workflow or simply interested in the intersection of technology and law, this episode is a must-listen.

    • 52 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
خرفني عن فلسطين | Tell me about Palestine
Tala morrar
CodeNewbie
CodeNewbie
Triple Click
Maximum Fun
The Code Story With Alameer
Alameer
The Vergecast
The Verge

You Might Also Like

The Cloudcast
Massive Studios
Malicious Life
Malicious Life
Security Now (Audio)
TWiT
Smashing Security
Graham Cluley & Carole Theriault
AWS Podcast
Amazon Web Services
Hacking Humans
N2K Networks