PLAY PODCASTS
StoneCast

StoneCast

74 episodes — Page 2 of 2

Ep 24Two-Hour Incident Response: The Key to Cybersecurity Readiness

Explore the world of advanced cybersecurity solutions with a focus on StoneFly's groundbreaking incident response and proactive defense services. In this episode, we take a comprehensive look at how StoneFly ensures business continuity through their guaranteed 2-hour response time for cybersecurity incidents. Discover the meticulous process they follow to quickly assess, contain, and mitigate threats before they escalate.But that's not all — we also dive into their proactive services designed to keep organizations secure long before a threat materializes. From penetration testing that uncovers hidden vulnerabilities to comprehensive cloud security assessments and compliance management, StoneFly provides a multi-layered approach to safeguarding critical systems.Learn why leading organizations trust StoneFly not only for their rapid incident response but also for building long-term resilience against an evolving threat landscape. Whether you're a business owner, IT professional, or cybersecurity enthusiast, this episode will provide valuable insights on staying one step ahead of cyber adversaries with StoneFly's innovative solutions.

Feb 11, 202512 min

Ep 23StoneFly DR365V: The Ultimate Backup and Disaster Recovery Solution with Air-Gapped Security

In this deep dive, we explore the importance of backup storage in today’s cyber threat landscape. Discover how StoneFly’s DR365V, a Veeam-certified backup solution, provides enterprise-grade protection with features like air-gapped storage, immutability, and flexible storage options (SAN, NAS, and S3 object storage). Learn how this cost-effective solution ensures data security against ransomware and integrates seamlessly with existing infrastructures. Stay ahead of cyber threats with StoneFly’s cutting-edge technology. Watch now to see why DR365V is a game-changer for data protection!

Feb 10, 20255 min

Ep 22Unlocking the Power of Local S3 Object Storage: Scalability, Security, and StoneFly Solutions

Discover how S3 object storage brings cloud-like scalability and performance to on-premises environments. In this deep dive, we explore what S3 object storage is, how it works, and why it’s essential for managing unstructured data. Learn about StoneFly’s innovative solutions, including SCVM for virtualized setups and high-performance S3 object storage appliances. Plus, find out how StoneFly’s advanced security features, like air-gapped vaults and always-on air-gapped storage, protect your data from ransomware threats. If you're looking for a reliable, scalable, and secure local S3 storage solution, this guide is for you!

Feb 10, 202521 min

Ep 21Ransomware-Proof Unified SAN, NAS, and S3 Object Storage Platform: StoneFly USO

In this episode, we dive into the advanced technology behind the StoneFly Unified Storage Appliance, a comprehensive solution that seamlessly integrates SAN, NAS, and S3 object storage into a single, high-performance platform. We explore how this appliance redefines enterprise storage strategies by offering unmatched flexibility, scalability, and data protection capabilities for modern IT environments.Key Technical Highlights:Unified Storage Architecture:We break down how the appliance consolidates SAN (block-level), NAS (file-level), and S3 object storage, allowing enterprises to manage diverse workloads with a single, streamlined solution.Storage Virtualization with StoneFusion:Discover how the patented StoneFusion storage operating system virtualizes storage resources, enabling dynamic provisioning, thin provisioning, snapshots, and replication for optimized data management.Performance and Scalability:Learn how the appliance supports scalable storage configurations, including NVMe SSDs for ultra-fast performance, SAS drives for high-capacity storage, and built-in tiering to optimize data placement across hot and cold tiers.Data Protection and Security:Explore advanced features such as air-gapped and immutable storage for ransomware protection, built-in encryption, and automated replication for disaster recovery.High Availability and Fault Tolerance:Understand how the system ensures continuous data access with active-active controllers, clustered configurations, and automated failover/failback mechanisms.Multi-Cloud Integration:We discuss how the appliance integrates seamlessly with public cloud providers and supports hybrid cloud architectures, giving enterprises the flexibility to manage data across on-premises and cloud environments.Cost Efficiency and Infrastructure Optimization:Find out how the appliance helps businesses reduce TCO by consolidating storage silos, simplifying management, and maximizing existing infrastructure investments.Whether you're an IT leader looking to modernize your data storage strategy, a systems architect exploring hybrid cloud solutions, or a data protection expert seeking resilient storage options, this episode offers deep insights into how StoneFly’s unified storage appliance delivers the performance, scalability, and security required for today’s data-driven enterprises.

Feb 4, 202528 min

Ep 20AI-Integrated Sandbox: Improving DevOps, Threat Analysis & Disaster Recovery

In this episode, we explore the cutting-edge capabilities of the StoneFly AI SandboxHub, a revolutionary appliance designed to merge AI-powered analytics with secure, isolated sandbox environments. This unique solution enables enterprises to accelerate DevOps testing, conduct sophisticated threat analysis, and enhance disaster recovery orchestration with AI precision.We begin by examining the key architectural elements of the AI SandboxHub. Built with high-performance compute and storage components, it delivers seamless integration with enterprise IT environments, supporting hypervisors such as Proxmox, VMware, and Hyper-V. The appliance also features built-in automation and orchestration capabilities, optimized for both on-premises and hybrid cloud deployments.Key topics we discuss include:AI-Powered Threat Analysis: Learn how the AI SandboxHub detects and analyzes sophisticated cyber threats by leveraging machine learning algorithms trained to identify anomalies and malicious patterns.DevOps Testing and Agile Development: Discover how the appliance accelerates software development lifecycles by providing developers with isolated, AI-assisted testing environments, enabling faster bug detection and feature validation.Disaster Recovery Orchestration: Hear how the appliance integrates AI-driven decision-making into DR workflows, automating critical tasks like workload failover, replication monitoring, and data integrity verification.Security and Compliance: The sandbox environments offer complete data isolation, ensuring that sensitive information remains protected while meeting stringent compliance requirements.We also dive into the technical innovations behind StoneFly’s appliance, such as its use of air-gapped storage, support for NVMe SSDs for ultra-fast data access, and integration with AI/ML models that can be trained on-premises for advanced analytics.Whether you're a cybersecurity expert, DevOps engineer, or IT leader seeking to enhance disaster recovery strategies, this episode provides valuable insights into how the StoneFly AI SandboxHub is transforming enterprise IT operations with AI-driven intelligence and security-first principles.

Feb 3, 202519 min

Ep 19Spear Phishing Survival Guide: Defend Your Enterprise Like a Pro

In this episode of Deep Dive, we dissect one of the most dangerous and targeted cyber threats — spear phishing. Unlike generic phishing attempts, spear phishing involves meticulously crafted emails aimed at specific individuals or organizations, often impersonating trusted entities to deceive victims into divulging sensitive information or granting unauthorized access.We explore the anatomy of a spear phishing attack, covering the following critical areas:Attack Methods: Understand how threat actors gather information from public sources, social media, and compromised databases to personalize their attacks and increase the likelihood of success.Common Payloads: Discover how spear phishing emails deliver malicious payloads, including ransomware, credential-stealing malware, or links to fraudulent login pages.Key Indicators: Learn to identify red flags such as subtle changes in sender addresses, urgent language, and unexpected attachment requests.Enterprise Defense Strategies: Email Security Solutions: Implementing advanced email filtering with AI-driven threat detection. User Training: Building a human firewall through phishing awareness programs. Zero Trust Models: Limiting network access to reduce exposure even if a breach occurs. Multi-Factor Authentication (MFA): Adding layers of security to critical systems. Incident Response: Practical advice on isolating compromised accounts, resetting credentials, and analyzing the attack vector to strengthen defenses.Join us for an in-depth look at spear phishing and learn how to fortify your defenses against this growing cyber threat targeting enterprises worldwide.

Feb 2, 202512 min

Ep 18BlackCat (ALPHV) Uncovered: Tactics, Payloads & Defense Strategies

In this Deep Dive episode, we unravel the complexities of BlackCat (ALPHV) ransomware, a sophisticated and highly adaptable strain written in Rust—a programming language known for its speed and cross-platform compatibility. BlackCat's advanced features and modular architecture have made it one of the most versatile threats in the ransomware landscape.We break down the technical elements that set BlackCat apart, including its encryption algorithms, stealthy attack vectors, and multi-platform deployment capabilities targeting Windows and Linux environments. Learn how BlackCat leverages double extortion techniques, where encrypted data is held for ransom and sensitive information is threatened with public exposure if demands are not met.Key discussion points include:BlackCat's Attack Lifecycle: How it infiltrates systems using phishing emails, compromised credentials, and RDP exploits.Payload Analysis: Deep insights into its Rust-based structure and unique encryption processes.Mitigation Strategies: Practical defenses, including robust access controls, network segmentation, air-gapped backups, and immutable storage solutions.Incident Response: How organizations can recover from a BlackCat attack and improve future resilience.Join us for a technical exploration into one of the most advanced ransomware threats today and discover actionable steps to protect your enterprise from becoming the next target.

Feb 1, 202520 min

Ep 17From Factories to Firewalls: The Automotive Industry’s Ransomware Crisis

In this episode, we explore the escalating threat of ransomware attacks on the automotive industry, a sector increasingly reliant on digital systems and interconnected technologies. Drawing from StoneFly’s blog, we uncover how cybercriminals are exploiting vulnerabilities in manufacturing systems, supply chains, and connected vehicles to launch devastating attacks.We’ll dissect real-world incidents where ransomware has halted production lines, disrupted supply chains, and compromised sensitive data, costing companies millions. The discussion will delve into the technical mechanisms of these attacks, including phishing, unpatched software vulnerabilities, and weak network security, which serve as entry points for ransomware.The episode will also highlight the unique challenges faced by the automotive industry, such as the integration of IoT devices in vehicles, legacy systems in factories, and the complexity of global supply chains. We’ll examine how these factors create a perfect storm for ransomware proliferation.To combat this growing threat, we’ll explore actionable strategies, including the implementation of advanced endpoint protection, regular penetration testing, and robust backup and disaster recovery solutions. We’ll also discuss the role of AI-driven threat detection and employee training in building a resilient cybersecurity posture.Whether you’re an automotive industry professional, a cybersecurity expert, or simply interested in the intersection of technology and security, this episode will provide critical insights into defending against one of the most pressing cyber threats of our time. Tune in to learn how the automotive industry can stay one step ahead of ransomware attackers.

Feb 1, 202523 min

Ep 16SaaS Downtime Exposed: How Single Points of Failure Cripple Industries

In this episode, we take a deep dive into the critical issue of SaaS downtime and how single points of failure can bring entire industries to a standstill. Drawing insights from StoneFly’s blog, we explore the technical and operational challenges that arise when SaaS platforms fail, from cascading outages to lost productivity and revenue.We’ll break down the anatomy of single points of failure, examining how dependencies on centralized infrastructure, inadequate redundancy, and poor disaster recovery planning can amplify the impact of downtime. Using real-world examples, we’ll discuss how industries like healthcare, finance, and e-commerce are particularly vulnerable to these disruptions.The episode will also cover proactive strategies to mitigate these risks, including the adoption of distributed architectures, robust backup solutions, and failover mechanisms. We’ll highlight the role of technologies like hyperconverged infrastructure (HCI), cloud-native redundancy, and automated recovery systems in building resilient SaaS ecosystems.Whether you’re an IT professional, a business leader, or simply curious about the hidden vulnerabilities of the cloud, this episode will provide actionable insights to help you safeguard your operations against the next big outage. Tune in to learn how to turn potential disaster into a roadmap for resilience.

Jan 31, 202514 min

Ep 15Black Basta Ransomware: Unmasking a Lethal Cyber Threat

In this episode of the Deep Dive podcast, we uncover the inner workings of Black Basta, one of the most sophisticated ransomware families wreaking havoc on enterprises worldwide. Known for its double extortion tactics, Black Basta not only encrypts sensitive files but also exfiltrates data, threatening public leaks to pressure victims into paying hefty ransoms.We’ll analyze:Techniques and Infection Vectors: From phishing emails and exploiting vulnerabilities to compromised Remote Desktop Protocol (RDP) credentials, learn how attackers infiltrate networks.Encryption and Exfiltration Mechanisms: A step-by-step breakdown of Black Basta’s encryption process and its methods for exfiltrating data before initiating ransom demands.Targeted Industries: Why sectors like healthcare, finance, and manufacturing have become prime targets and how the group customizes attacks based on victims' IT environments.Defense Strategies: Practical tips for preventing ransomware attacks, including endpoint protection, network segmentation, vulnerability management, and backup best practices.Case Studies and Incident Response: Real-world examples of Black Basta attacks and lessons learned from organizations that successfully mitigated the damage.Whether you're a cybersecurity professional, IT admin, or business leader, this episode equips you with the knowledge to identify, prevent, and respond to ransomware attacks like Black Basta.🎧 Listen now to stay ahead of emerging threats in the evolving cybersecurity landscape.

Jan 30, 202515 min

Ep 14Cyber Insurance & SaaS Downtime: Are You Really Covered?

In this episode, we uncover the hidden vulnerabilities businesses face with SaaS platforms and the limitations of cyber insurance in addressing downtime. SaaS outages can disrupt operations, leading to data inaccessibility, lost revenue, and delayed recovery, but many insurance policies exclude downtime-related losses. We delve into why these exclusions exist, the challenges of insuring SaaS availability, and the financial impact of prolonged disruptions.Discover how hybrid infrastructures with on-premises systems provide faster recovery times, minimize downtime, and enhance resilience. We also discuss the importance of integrating solutions like backups, disaster recovery appliances, and multi-layered strategies to protect critical workloads and ensure business continuity. Tune in for actionable insights to fortify your SaaS-dependent operations and bridge the gaps in cyber insurance coverage.

Jan 30, 202518 min

Ep 13Turla Ransomware: A Closer Look at the Russian Cyber Espionage Group

Turla ransomware is a Russian-linked cyber espionage group linked to high profile cyberattacks including Solarwinds and Starlink cyberattack, and the recent cyberattack on the Ukrainian military network. In this Deep Dive podcast, we breakdown Turla ransomware and the methods they use to infiltrate the networks of their victims including exploiting unmatched vulnerabilities, spear phishing, remote execution, credential harvesting, network scanning and the command-and-control methods used by Turla ransomware.Our experts will also analyze the techniques Turla ransomware uses including: · Hybrid tactics involving tools like Amadey and custom backdoors.· Infrastructure sharing with other cyber criminals. · Custom malware deployment using malware such as KazuarV2. The podcast will conclude with a discussion about the different mitigation measures that businesses can implement to prevent a Turla ransomware attack including endpoint detection and response (EDR) tools, network segmentation, zero trust architecture, threat intelligence, and air-gapped and immutable backups. Also read: Turla Ransomware: Comprehensive Analysis of the Russian APTLooking to protect your sensitive data from Turla ransomware? Talk to our experts today. Contact [email protected] or call +1 510 265 1616.

Jan 30, 202520 min

Ep 128Base Ransomware Deep Dive: How it Attacks and How to Stop it

In this episode of the Deep Dive podcast, we’re taking a closer look at the notorious 8Base ransomware. The 8Base ransomware group became active in 2022, became aggressively active in 2023, and continues to target small to medium sized businesses (SMBs) in the United States (US), Brazil, and United Kingdom (UK). What we’ve discussed in this podcast session: 1. How 8Base ransomware targets its victims2. Recent cyberattacks involving 8Base ransomware group3. How to detect an 8Base ransomware attack4. How to mitigate the risk of a successful 8Base ransomware attackThis deep dive provides value for cybersecurity experts and professionals responsible for managing and maintaining SMB, SME, enterprise, and managed service provider (MSP) data center(s). Related Resource: 8Base Ransomware: Detection, Prevention, and Mitigation

Jan 30, 202515 min

Ep 11Rhysida Ransomware: The Threat, Its Impact, and Your Defense Strategy

In this episode of the Deep Dive podcast, we analyze Rhysida ransomware, a rising cyber threat targeting businesses and institutions. Rhysida uses phishing emails and remote desktop protocol (RDP) vulnerabilities to gain unauthorized access, encrypt critical data, and demand ransoms. We explore its encryption techniques, commonly leveraged attack vectors, and its reliance on double extortion tactics—stealing sensitive data before encryption to pressure victims into paying.Our experts discuss how to detect early signs of a Rhysida attack, including unusual spikes in network activity, unauthorized file access, and encryption of system-critical files. We provide actionable steps for mitigating these risks, such as:Enforcing Multi-Factor Authentication (MFA) to reduce RDP exploitation.Regularly patching systems to close vulnerabilities Rhysida exploits.Implementing robust endpoint detection and response (EDR) tools for real-time monitoring.Deploying air-gapped and immutable backups to prevent data loss even during an attack.Using network segmentation to isolate critical assets from broader access.We break down practical defense strategies, empowering you to protect your organization against ransomware threats like Rhysida. If you're looking to strengthen your ransomware defenses, this episode is packed with technical insights to help you get started.🎧 Listen now to understand and safeguard your systems.

Jan 30, 202514 min

Ep 10Veeam Cloud Connect in Action: Housing Company’s Backup Transformation

In this episode of the Deep Dive podcast, we explore how a housing company revolutionized its backup strategy by adopting Veeam Cloud Connect with StoneFly’s purpose-built appliance. Learn how this solution addressed growing storage needs, ensured data security, and optimized backup management.We break down the technical process behind Veeam Cloud Connect integration, discuss the benefits of cloud backups, and highlight the seamless scalability the housing company achieved. Whether you’re considering a hybrid approach to data protection or looking to streamline your IT infrastructure, this episode provides valuable insights for IT teams and decision-makers.🎧 Listen to the full episode to uncover the challenges, solutions, and outcomes.

Jan 30, 202515 min

Ep 9Accelerating Data Protection: How a Transportation Company Improved Backups with Veeam

In this episode, we explore how a transportation company revolutionized its data protection strategy by implementing StoneFly’s backup and storage solutions. Faced with slow backup processes and increasing data volumes, the company turned to StoneFly to optimize performance and ensure reliability. We break down the technical approach, including the deployment of high-performance backup appliances, enhanced storage management, and seamless integration with existing systems. Learn how these changes not only accelerated backup speeds but also improved overall data security and recovery capabilities. Tune in to uncover insights into overcoming backup challenges and achieving scalable, efficient data protection for mission-critical operations.

Jan 28, 202517 min

Ep 8Securing Financial Data: How a Bank Leveraged Veeam Appliances Across Multiple Locations

In this episode, we delve into how a leading bank overcame the challenges of securing critical financial data across multiple locations. The discussion highlights the role of StoneFly’s Veeam Ready appliance in delivering robust data protection, seamless backups, and efficient recovery.Learn how the bank integrated centralized management, optimized storage usage, and ensured compliance with stringent industry regulations—all while maintaining high availability for their distributed network. Discover the technical strategies and best practices that made this deployment a success, offering valuable insights for organizations aiming to secure their data across geographically dispersed environments.

Jan 28, 20257 min

Ep 7Hospitality Meets High Performance: Hotels and StoneFly Enterprise NAS

In this episode, we delve into how hotels enhanced their IT operations using StoneFly Enterprise NAS. The discussion covers the technical challenges they faced, including handling high volumes of guest and operational data, ensuring data accessibility across multiple locations, and maintaining robust data protection. We detail how the StoneFly NAS solution, equipped with enterprise-grade features like scalable storage, high-speed performance, and advanced redundancy options, helped centralize their data management.The podcast also explores how the built-in data protection features, including air-gapped and immutable backups, ensured data security against ransomware threats, while seamless integration with existing IT workflows minimized operational disruption. Tune in to learn how these technical solutions translated into better guest experiences, from faster check-ins to enhanced service delivery, and how they positioned the hotels for scalable growth in a data-driven industry.

Jan 27, 202513 min

Ep 6StoneFly DR365V Explained: Veeam Ready Air-Gapped and Immutable Backup and DR Solution

In this episode, we break down the StoneFly DR365V, a purpose-built air-gapped and immutable Veeam Ready backup and disaster recovery solution. Whether you’re managing virtual machines, physical servers, or cloud workloads, the DR365V offers unparalleled data protection with seamless integration and advanced features like ransomware-proof storage.We simplify its architecture, explore key capabilities such as support for air-gapped backups, immutable snapshots, and flexible storage configurations, and discuss how it addresses common challenges in data backup and recovery.Tune in to gain a deeper understanding of how the DR365V empowers businesses to safeguard their critical data while ensuring fast recovery and operational continuity.#BackupSolutions #DisasterRecovery #StoneFlyDR365V #DataProtection #VeeamIntegration #BusinessContinuity

Jan 27, 202519 min

Ep 5Cloud Storage Decoded: File, Block, and Object Explained

In this episode, we take a comprehensive look at the three pillars of modern data storage: file, block, and object storage. Each type offers distinct advantages and is best suited for specific use cases, from powering enterprise applications to managing unstructured data in the cloud.Join us as we explain the core differences between these storage types, explore their unique features, and discuss real-world scenarios where each shines. Whether you’re an IT professional evaluating storage solutions, a developer optimizing workloads, or simply curious about cloud storage, this discussion provides clarity to help you make informed decisions.Tune in to learn how to select the best storage approach for your business needs and keep your data infrastructure future-ready.#CloudStorage #FileStorage #BlockStorage #ObjectStorage #DataManagement #StorageSolutions

Jan 27, 202511 min

Ep 4Healthcare IT Secures Veeam Backups in Ransomware-Proof NAS

In this episode, we explore how a leading healthcare IT provider reinforced its data security and expanded its storage capabilities with a ransomware-proof NAS solution. The discussion dives into their existing Veeam storage infrastructure, the challenges of securing sensitive healthcare data against ransomware threats, and the strategic decision to integrate a NAS solution designed for resilience and performance.Learn how the combination of advanced storage technology and robust security measures enabled this provider to ensure data protection, streamline backups, and scale to meet growing demands—all while safeguarding critical healthcare information. Whether you're managing IT in healthcare or just looking to strengthen your own infrastructure, this episode offers valuable insights into creating ransomware-proof storage solutions.

Jan 27, 202516 min

Ep 3From Downtime to Uptime: Improving Municipal Backup and DR Systems

Explore the technical challenges and solutions behind a government municipality's quest for reliable data protection. This episode delves into the critical issues they faced, including failed backups, slow recovery times, and the risks of data loss impacting essential services.The discussion focuses on the municipality's transition to a modernized backup and disaster recovery solution featuring air-gapped and immutable storage, automated scheduling, and rapid recovery processes to ensure data availability and continuity.Gain insights into the importance of robust data protection for public sector organizations and the impact of efficient backups on government operations. Whether you're managing IT for the public or private sector, this conversation offers actionable lessons for improving resilience and ensuring uptime.

Jan 27, 20259 min

Ep 2Veeam Ready Backup and DR Solution Secures Logistics for Container Leasing Firm

This episode covers how a global container leasing firm resolved critical data protection challenges by upgrading to an advanced backup and disaster recovery solution. We break down the technical issues they faced, including unreliable backups, slow recovery, and limited scalability.The discussion highlights the implemented solution’s key features, such as automated backups, air-gapped and immutable storage, and fast disaster recovery capabilities that secure critical business data.Learn how the firm improved data protection, minimized downtime, and ensured operational continuity—valuable insights for IT teams planning to upgrade their infrastructure.

Jan 27, 202510 min

Ep 1Load Balancing 101: Types, Algorithms, and Why It Matters

Load balancing is a critical component of enterprise IT infrastructure, essential for maintaining the performance, reliability, and scalability of systems in a world where downtime is not an option. This podcast delves deep into the mechanisms and strategies behind load balancing, offering a comprehensive understanding of how it distributes workloads across multiple servers to optimize resource utilization and minimize response times.We explore popular load-balancing algorithms, including round-robin, least connections, IP hash, and weighted distribution, highlighting their strengths, limitations, and ideal use cases. The discussion also touches on real-world applications across various industries, from e-commerce platforms managing high web traffic to healthcare systems ensuring uninterrupted access to critical services.Key topics include:How load balancing enhances fault tolerance and high availability.Differences between hardware-based, software-based, and cloud-based solutions.The role of load balancing in hybrid cloud and edge computing environments.Practical tips for configuring and managing load balancers to meet your organization’s needs.Whether you’re an IT manager, system administrator, or simply curious about how modern technology keeps systems running smoothly, this episode is packed with insights to help you understand and implement effective load-balancing strategies.

Jan 23, 202523 min