Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Tags: The CloudBytes Podcast
Author: Brian Knudtson
Date: December 2, 2022

The CloudBytes Podcast: Season 3 is Here!

Here’s an understatement: Data security is a major concern! Don’t fret. Listen to the freshly-launched Season 3 of the CloudBytes Podcast for an in-depth primer on all things cybersecurity.

It’s been been nearly three years, two seasons, and 45 episodes since we first launched The CloudBytes Podcast in 2020. Being a part of those (approximately) 1,350 minutes of fantastic conversation — not to mention the many more spent working off air — gave me such immense pleasure. Indeed, I consider them to be a highlight of my time spent at iland. That’s why I’m so excited to announce the official launch of Season 3, and another 23 episodes ready to be binged!

For those who may be unfamiliar with the first two seasons of CloudBytes (go check them out!), we focused very strongly on — you guessed it — the cloud. However, for me, there was one discussion topic that clearly stood out: Security is a top concern for organizations moving their data to the cloud. In fact, we devoted an entire episode to it last season. In the meantime, iland was acquired by 11:11 Systems (in case you hadn’t heard) — a company with cloud, connectivity, and security at its core. This major development opened up a whole new opportunity for me and the podcast: the ability to directly address cybersecurity.

As a legacy sysadmin, I decided to approach Season 3 as a cybersecurity primer for systems/cloud administrators like me. But I also wanted it to be something that could be interesting to people who specialize in cybersecurity. Anyone who is in this industry for more than a few years (generally) knows what “cybersecurity” is. But there are many, many disciplines that comprise such a simple phrase. So, with the intention of building a primer, I laid them out and tackled what we could.

The result is a brand new season of The CloudBytes Podcast with episodes that address the following topics:

  • Network Defenses: Classic defenses like firewalls and network segmentation.
  • Secure Connectivity: Distributed environments are almost a given, so how do we connect them together securely?
  • Asset Management: You can’t protect or recover what you don’t know about, so tracking what you have is critical.
  • Service Provider Management: If you rely on another organization to support your infrastructure (like a cloud provider), how do you ensure the security of your data with them?
  • Supply Chain Protection: The Solarwinds attack made us all acutely aware of how much trust we put into our technology providers, but should we?
  • Application Protection: Applications allow us to access data, so putting up defenses to protect them is important. Unfortunately, doing so is very dependent on the application.
  • Data Protection: Data is what it’s all about, so how can we go about protecting the most elemental part of our infrastructure?
  • Malware Defense: Ransomware is the cybersecurity threat at the forefront of all our minds. Understanding this threat must be the first step in stopping it.
  • Vulnerability Management: Defending infrastructure is often times a battle to keep the holes in the dam filled, so how you track and address those vulnerabilities is critical to success.
  • The Human Element: Cybersecurity is more than computer systems – there are people managing the infrastructure, defending the systems, and using the applications. They’re all critical to the protection of the data.
  • Employee Awareness: It’s often said that people are the weakest link in the cybersecurity battle, so how do we best equip them knowing they’re still likely to fail?
  • Identity and Access Management: Secure access to applications and data means properly identifying who is trying to gain access, what is being accessed, and what level of access they should have.
  • Secure Configuration: The security posture of all systems, especially the cloud, is predicated on securely configuring the system – which can be daunting and should not to be taken lightly.
  • Data Protection (Part II!): In the wake of ransomware and other destructive cyber incidents, the ultimate safety net is reverting to backups. So how should this be done?
  • Data Recovery: Backups are great, but only if they can be recovered in the right place, at the right time.
  • Log Management and Monitoring: Logs are haystacks that carry precious needles, but it’s no small task to find them.
  • Detection and Response: The best way to find and stop cybercriminals is to detect their behavior from the very start and respond as quickly as possible.
  • Penetration Testing: The best way to know where defenses are weakest is actively test them, but it’s not always as simple as finding a friendly neighborhood hacker.
  • Private Cloud: Somewhere between public cloud and on-premises data centers is an approach to cloud that gives organizations a dedicated cloud environment, but is it also middle ground for security?
  • Incident Response: Even the best defenses can fail, so every organization should have a plan on how to respond to a full-blown cyber incident.

As with past seasons, all the episodes have been released at once and are now available to binge over at cloudbytes.1111systems.com. But if you’re a once-a-week podcast listener, you can subscribe to our Spotify feed (or simply search in your podcast app of choice) to listen to the weekly episode drops. It was an ambitious amount of content to cover, but I was very fortunate to find a fantastic and varied set of panelists to discuss these topics. I hope you enjoy listening to these conversations as much as I did having them!

Categories: Cloud Backup, Cybercrime, DRaaS, Ransomware, Security, UncategorizedBy Brian KnudtsonDecember 2, 2022
Tags: The CloudBytes Podcast

Author: Brian Knudtson

In his 20-year career, Brian has experienced many different perspectives of the IT industry. He has worked as a value-added reseller, vendor and service provider in roles in web development, system administration, post-sales deployment, pre-sales architecting, public cloud design and technical marketing. Currently, Brian is the Director of Cloud Market Intelligence at 11:11. He enjoys spending time with his wife and three kids. He is also heavily involved with the Destination Imagination program and has been a long-time member of the VMware community, notably starting the Omaha VMUG and putting on VMunderground at VMworld. You can find him online occasionally blogging at http://knudt.net/vblog and tweeting at @bknudtson.

Post navigation

PreviousPrevious post:Changes To Cyber Insurance Mean Adjusting Your Approach to Managing RiskNextNext post:Litigation Hold Is Not Backup

Related Posts

Better Network Visibility with New 11:11 Cloud Console Tools
August 21, 2025
Graphic depiction of a backup repository
Simplify VBR Direct Repository Migration with VeeaMover
August 11, 2025
VMware Partner
Major VMware Partnership Announcement and How 11:11 Systems Keeps You Moving Forward
July 16, 2025
Entra ID
Recovering Entra ID with Veeam
July 16, 2025
Digital Operational Resilience Act (DORA)
Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
July 10, 2025
HPE Zerto Names 11:11 Systems Global Partner of the Year for 2024
HPE Zerto Names 11:11 Global Partner of the Year
June 26, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top