1. EachPod
EachPod
StoneCast - Podcast

StoneCast

We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions

How To Education Technology
Update frequency
every day
Average duration
16 minutes
Episodes
74
Years Active
2025
Share to:
Brute Force Attacks Unlocked: How Hackers Guess Their Way In

Brute Force Attacks Unlocked: How Hackers Guess Their Way In

In this episode, we dive deep into the world of brute force attacks—one of the oldest yet still dangerously effective cyberattack methods. We unpack what brute force attacks are, how they work, and t…

00:19:18  |   Mon 26 May 2025
From 3-2-1 to 4-3-2: How Many Backup Copies Are Enough?

From 3-2-1 to 4-3-2: How Many Backup Copies Are Enough?

When it comes to protecting your data, not all backup strategies are created equal. In this episode, we dig deep into the evolution of backup best practices — starting with the tried-and-true 3-2-1 m…

00:11:13  |   Thu 17 Apr 2025
XDR vs MDR vs EDR vs NDR – What’s the Right Fit for Your Security Stack?

XDR vs MDR vs EDR vs NDR – What’s the Right Fit for Your Security Stack?

In this episode, we break down four of the most talked-about cybersecurity technologies—EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), XDR (Extended Detection and Respon…

00:13:45  |   Wed 16 Apr 2025
StoneFly Secures Veeam Backups & Disaster Recovery: A Game-Changer in Data Protection

StoneFly Secures Veeam Backups & Disaster Recovery: A Game-Changer in Data Protection

In this deep dive episode, we break down the StoneFly DR 365V, an all-in-one backup and disaster recovery solution that addresses data protection, compliance, and scalability. Whether you're a small …

00:22:17  |   Mon 14 Apr 2025
Backups, Recovery, and Continuity: Understanding BaaS, RaaS, and DRaaS

Backups, Recovery, and Continuity: Understanding BaaS, RaaS, and DRaaS

Not all data recovery services are created equal. In this episode, we break down the core differences between Backup as a Service (BaaS), Recovery as a Service (RaaS), and Disaster Recovery as a Serv…

00:11:18  |   Fri 04 Apr 2025
Immutable Backups: Your Cyber Insurance Lifeline

Immutable Backups: Your Cyber Insurance Lifeline

In this episode, we dive into the growing link between cyber insurance eligibility and immutable backups. As ransomware attacks become more frequent and sophisticated, insurance providers are tighten…

00:14:46  |   Fri 04 Apr 2025
From Backups to Real-Time Mirrors: Making Sense of Data Replication Strategies

From Backups to Real-Time Mirrors: Making Sense of Data Replication Strategies

"Replication isn’t just a technical checkbox—it’s your digital insurance policy."

In this episode, we dive deep into the four most common data replication methods—array-based, host-based, hypervisor-b…

00:20:04  |   Fri 04 Apr 2025
Building AI/ML Data Lakes: Why S3 Object Storage Outperforms Traditional Storage

Building AI/ML Data Lakes: Why S3 Object Storage Outperforms Traditional Storage

AI and machine learning (ML) demand massive amounts of data, seamless scalability, and high-speed access—which is why traditional storage solutions often fall short. S3 object storage is rapidly beco…

00:19:45  |   Mon 31 Mar 2025
ESXiArgs Ransomware: A Silent Threat to VMware Servers

ESXiArgs Ransomware: A Silent Threat to VMware Servers

The ESXiArgs ransomware attack is a wake-up call for organizations relying on VMware ESXi servers for virtualization. Targeting unpatched and vulnerable systems, this ransomware encrypts virtual mach…

00:17:11  |   Mon 31 Mar 2025
Medical Data at Risk? How to Store & Protect Patient Records

Medical Data at Risk? How to Store & Protect Patient Records

As hospitals and healthcare providers transition from paper to digital, medical record storage and archiving have become critical challenges. From electronic health records (EHRs) to PACS imaging sys…

00:16:52  |   Sat 29 Mar 2025
AI Workloads Demand More—Is Your Storage Ready?

AI Workloads Demand More—Is Your Storage Ready?

AI workloads are pushing traditional IT infrastructure to its limits. In this episode, we break down how AI storage and servers must evolve to handle massive datasets, high-speed processing, and scal…

00:14:40  |   Sat 29 Mar 2025
Ransomware vs. Manufacturing: How Ransomware Disrupts Production Lines

Ransomware vs. Manufacturing: How Ransomware Disrupts Production Lines

Manufacturing is under attack. Ransomware is rapidly becoming one of the biggest threats to industrial operations, bringing production lines to a halt, disrupting supply chains, and costing businesse…

00:15:50  |   Sat 29 Mar 2025
Volume Deletion Protection: The Ultimate Fail-Safe for Ransomware, Human Error, and Accidental Deletion

Volume Deletion Protection: The Ultimate Fail-Safe for Ransomware, Human Error, and Accidental Deletion

Data loss isn’t always caused by hardware failures—it can happen through accidental deletions, insider threats, and ransomware attacks that target storage volumes. In this episode, we break down Volu…

00:22:19  |   Fri 28 Mar 2025
Ransomware vs. Healthcare: The Silent Crisis in Hospitals

Ransomware vs. Healthcare: The Silent Crisis in Hospitals

Hospitals and healthcare providers are on the frontlines of a growing cyber crisis—ransomware attacks that lock down critical systems, disrupt patient care, and put lives at risk. In this episode, we…

00:15:41  |   Fri 28 Mar 2025
Education Under Attack: How Schools Can Secure Their Backups

Education Under Attack: How Schools Can Secure Their Backups

Schools, colleges, and universities are storing more data than ever—from student records and research data to online learning platforms. But with the rise of ransomware, accidental deletions, and sys…

00:16:45  |   Fri 28 Mar 2025
How Immutable Snapshots Stop Ransomware Attacks in Their Tracks

How Immutable Snapshots Stop Ransomware Attacks in Their Tracks

Ransomware is evolving, and attackers aren’t just encrypting your files—they’re deleting your backups to leave you with no way out. So, how do you fight back? Immutable snapshots.

In this episode, we …

00:24:54  |   Fri 28 Mar 2025
Backup Defense 101: Stopping Ransomware from Encrypting Your Data

Backup Defense 101: Stopping Ransomware from Encrypting Your Data

Backups are your last line of defense against ransomware attacks—but what if ransomware can delete them too? Many organizations assume that having backups means they’re safe, but modern ransomware ac…

00:11:51  |   Thu 27 Mar 2025
Lynx Ransomware: The Stealthy Cyber Threat You Need to Know

Lynx Ransomware: The Stealthy Cyber Threat You Need to Know

Ransomware threats are constantly evolving, and Lynx ransomware is one of the latest and most dangerous strains making headlines. But what makes this malware so effective? And how can businesses defe…

00:28:44  |   Thu 27 Mar 2025
Beyond Passwords: Why Multi-Factor Authentication is a Must

Beyond Passwords: Why Multi-Factor Authentication is a Must

In today’s digital world, passwords alone aren’t enough to keep cybercriminals out. Multi-Factor Authentication (MFA) has become a critical security measure, adding an extra layer of protection again…

00:14:43  |   Thu 27 Mar 2025
Ransomware as a Service (RaaS): How Hackers Sell Cybercrime

Ransomware as a Service (RaaS): How Hackers Sell Cybercrime

Ransomware is no longer just a tool for elite hackers—it’s now a service for sale on the dark web. Ransomware-as-a-Service (RaaS) has transformed cybercrime, allowing even low-skilled attackers to la…

00:15:52  |   Wed 26 Mar 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Stonefly. This content is not affiliated with or endorsed by eachpod.com.