www.lto.org Open in urlscan Pro
34.160.17.71  Public Scan

Submitted URL: http://www.lto.org/
Effective URL: https://www.lto.org/
Submission: On June 06 via manual from LK — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.lto.org/

<form role="search" method="get" action="https://www.lto.org/"> <label class="screen-reader-text" for="s">Search for:</label> <input type="hidden" name="et_pb_searchform_submit" value="et_search_proccess"> <input type="hidden"
    name="et_pb_include_posts" value="yes"> <input type="hidden" name="et_pb_include_pages" value="yes">
  <div class="bw-searchform"> <input type="text" name="s" placeholder="Search" class="et_pb_s"> <input type="submit" value="Search" class="et_pb_searchsubmit" style=""> </div>
</form>

GET https://www.lto.org/

<form role="search" method="get" action="https://www.lto.org/"> <label class="screen-reader-text" for="s">Search for:</label> <input type="hidden" name="et_pb_searchform_submit" value="et_search_proccess"> <input type="hidden"
    name="et_pb_include_posts" value="yes"> <input type="hidden" name="et_pb_include_pages" value="yes">
  <div class="bw-searchform"> <input type="text" name="s" placeholder="Search" class="et_pb_s"> <input type="submit" value="Search" class="et_pb_searchsubmit" style=""> </div>
</form>

Text Content

 * 
 * 
 * Licensee Login
 * Contact Us
 * 
 * 
 * Search for:
   

 * ABOUT LTO
   * What is LTO Technology?
   * Benefits of LTO Technology
   * LTO Technology Use Cases
   * FAQs about LTO Technology
   * LTO Technology Participants
 * LTO TECHNOLOGY
   * Roadmap
   * LTO 7 Type M media
   * LTO Generation 8
   * LTO Generation 9
   * LTO Generation Compatibility
   * Linear Tape File System
   * Encryption
   * Active Archiving
   * Sustainability
 * NEWS
   * Latest Headlines
   * NewsBytes
   * BlogBytes
   * Analyst and Media Quotes
   * Press Releases
   * Press Release Archive
 * RESOURCES
   * Tape Innovation Webinars
   * IDC – Solving Data Management Problems
   * TCO Calculator
   * Whitepapers and Reports
   * Case Studies
   * Videos and Other Resources
 * LICENSING
   * Licensing Process
   * Licensee Login

Select Page
 * ABOUT LTO
   * What is LTO Technology?
   * Benefits of LTO Technology
   * LTO Technology Use Cases
   * FAQs about LTO Technology
   * LTO Technology Participants
 * LTO TECHNOLOGY
   * Roadmap
   * LTO 7 Type M media
   * LTO Generation 8
   * LTO Generation 9
   * LTO Generation Compatibility
   * Linear Tape File System
   * Encryption
   * Active Archiving
   * Sustainability
 * NEWS
   * Latest Headlines
   * NewsBytes
   * BlogBytes
   * Analyst and Media Quotes
   * Press Releases
   * Press Release Archive
 * RESOURCES
   * Tape Innovation Webinars
   * IDC – Solving Data Management Problems
   * TCO Calculator
   * Whitepapers and Reports
   * Case Studies
   * Videos and Other Resources
 * LICENSING
   * Licensing Process
   * Licensee Login
 * 
 * 
 * Licensee Login
 * Contact Us
 * 
 * 
 * Search for:
   


SEE HOW LTO TAPE CAN HELP BUSINESSES ACHIEVE THEIR SUSTAINABILITY GOALS

READ MORE


IN 2022, LTO TAPE CAPACITY SHIPMENTS REACHED A NEW PEAK!

With 148.3 Exabytes, that’s more low cost, secure, green data storage than ever!

READ MORE


THE VALUE OF TAPE

Innovative. Cost-Effective.
Secure. Sustainable. Check out LTO technology!

Play


A NEW ROADMAP FOR
A NEW DATAVERSE

LTO technology now extends to 14 generations.
The future arrives today.

READ MORE


USING TAPE TO CREATE AN AIR GAP DEFENSE AGAINST RANSOMWARE

By Phil Goodwin, Research Director, IDC.
READ MORE


WHAT IS LTO TECHNOLOGY?

Linear Tape Open (LTO), also known as the LTO Ultrium format is a powerful,
scalable, adaptable open tape format that is optimized for high capacity,
maximum storage density and performance.
READ MORE


USING TAPE STORAGE TO SOLVE DATA MANAGEMENT PROBLEMS - A Q&A DISCUSSION WITH IDC

READ MORE


UNDERSTANDING THE DATA LIFE CYCLE

How tape delivers value throughout the life of your data

READ MORE


BLOGBYTES


EXPERT OPINIONS, INFORMATION AND COMMENT FROM THE LTO PROGRAM

READ MORE
PreviousNext
123456789


Low cost. Security from ransomware. Flexible expansion capability. Only LTO
technology.



LATEST HEADLINES




May 26, 2023
Ransomware driving professionalisation of cyber crime | ITWeb
The success of ransomware gangs has spurred a significant trend of
professionalisation among cyber criminals, where different groups develop
specialised services to offer one another, according to a new report from
WithSecure (formerly known as F-Secure Business).Ransomware has been around for
decades, but the threat has continuously adapted to improvements in defenses
through the years. One notable development is the current dominance of
multi-point extortion ransomware groups, which employ several extortion
strategies at once (usually both encryption to prevent access to data and
stealing data to leak publicly) to pressure victims for payments.According to an
analysis of over 3 000 data leaks by multi-point extortion ransomware groups,
organisations in the United States were the most common victims of these
attacks, followed by Canada, the United Kingdom, Germany, France and Australia.
Taken together, organisations in these countries accounted for three-quarters of
the leaks included in the analysis.The construction industry seemed to be the
most impacted and accounted for 19% of the data leaks. Automotive companies, on
the other hand, only accounted for about 6%. A number of other industries sat
between the two due to ransomware groups having different victim distributions,
with some families targeting one or more industry disproportionately to
others.While the threat of ransomware has inflicted considerable pain on
organisations in different countries and industries, its transformative impact
on the cyber crime industry cannot be overstated.“In pursuit of a bigger slice
of the huge revenues of the ransomware industry, ransomware groups purchase
capabilities from specialist e-crime suppliers, in much the same way that
legitimate businesses outsource functions to increase their profits,” explained
Senior Threat Intelligence Analyst Stephen Robinson. “This ready supply of
capabilities and information is being taken advantage of by more and more cyber
threat actors, ranging from lone, low-skilled operators, right up to nation
state APTs. Ransomware didn't create the cyber crime industry, but it has really
thrown fuel on the fire.”In one notable example highlighted in the report,
WithSecure investigated an incident that involved a single organisation
compromised by five different threat actors, each with different objectives and
representing a different type of cyber crime service: The Monti ransomware
group.Qakbot malware-as-a-service.A cryptojacking group known as the 8220 Gang
(also tracked as Returned Libra).An unnamed initial access broker (IAB).A subset
of Lazarus Group, an advanced persistent threat associated with North Korea’s
Foreign Intelligence and Reconnaissance General Bureau.According to the report,
this professionalisation trend makes the expertise and resources to attack
organisations accessible to lesser-skilled or poorly resourced threat actors.
The report predicts it is likely the number of attackers and size of the cyber
crime industry will both grow in the coming years.“We often talk about the
damage ransomware attacks cause to the victims. Less attention is paid to how
ransom payments provide additional resources to attackers, which has encouraged
the professionalisation trend described in the report. Near-term, we’re likely
to see this changing ecosystem shape the resources and type of attacks facing
defenders,” said WithSecure Head of Threat Intelligence Tim West.The full
report, The Professionalisation of Cyber Crime, is available
at: https://www.withsecure.com/en/expertise/research-and-innovation/research/the-professionalization-of-cyber-crime.More
information on ransomware is available
at: https://www.withsecure.com/en/expertise/blog-posts/ransomware-profits-are-transforming-cyber-crime.
May 26, 2023
Survey: Backups Are Prime Targets for Ransomware Attacks, Most Remain Exposed
Veeam's 2023 Ransomware Trends Report shows many pay ransom but don't always
recover. Organizations with the proper data protection architecture are ...
May 28, 2023
Are We Seeing Fewer Ransomware Attacks? Not Now - Government Technology
As I walked the show floor at the RSA conference and held meetings with vendors
and clients in San Francisco last month, I heard a surprising theme that I
disagreed with.The conversation often started with something like this: “Great
book with cyber stories, but isn’t ransomware dying?” (Note: They were referring
to the book I co-authored with Shamane Tan called Cyber Mayday and the Day
After.)Or, “Ransomware is way down, isn’t it?”Or, “What’s your biggest fear, now
that ransomware is going away?”And no, these colleagues and “industry experts”
from an assortment of cyber vendors were not delusional, just misinformed. When
I asked one colleague to send me some proof, he sent me several articles backing
up his claims:Security Magazine — Ransomware attacks decreased 61% in 2022: “The
2022 State of Ransomware Report from Delinea and conducted by Censuswide
surveyed 300 U.S.-based information technology (IT) decision-makers about the
impact of ransomware on their organizations over the past year. The survey found
that 25% of organizations were victims of ransomware attacks over the past 12
months, a 61% decline from the previous 12-month period, when 64% of
organizations reported being victims.”Security Week — Ransomware Revenue Plunged
in 2022 as More Victims Refuse to Pay Up: “According to data from Coveware, a
company that helps organizations respond to ransomware attacks, the percentage
of companies that paid up in 2022 dropped to 41%, from 50% in 2021 and 70% in
2020.”TechTarget — July [2022] another down month in ransomware attack
disclosures: “SearchSecurity has tracked ransomware in 2022 via a database of
public reports and disclosures, as well as an article series that covers the
most notable attacks each month. According to SearchSecurity's data sets, there
was approximately a 300% drop between attacks in January and June. July saw
similar numbers, with just 13 confirmed disclosures last month; in addition,
only three disclosures were for attacks in July.”Inside P&C — Cyber frequency
fell 22% in 2022 as ransomware dropped 54%: Coalition: "Cyber claims frequency
declined 22% year over year in 2022, driven mostly by a 54% drop in ransomware
attacks, according to InsurTech Coalition.”BUT NOT SO FASTWhile there is debate
about how much ransomware incidents dropped in 2022, the trend (if there ever
was one, which I doubt) has certainly flipped in 2023. Consider these
reports:Politico — Ransomware comes back with a vengeance: “Researchers at a
leading cryptocurrency tracing company have bad news for Washington: Ransomware
is back, and it might be worse than ever.“Through the first four months of this
year, cybercriminal gangs are on pace to surpass their earnings from a
record-setting 2021, according to new data collected by Chainalysis.“The
bounceback in extortion revenue follows a 40 percent dip in ransom payments in
2022, which many had interpreted as a promising sign the Biden administration
was making headway against keyboard crooks.”WION: Nearly two-thirds of
India-based companies victims of ransomware attack: “In an alarming statistic
that describes the State of Ransomware in 2023, it has been revealed that 73
percent of India-based organisations surveyed by cybersecurity company Sophos
were victims of ransomware attacks.”The Hacker News — Buhti Ransomware Gang
Switches Tactics, Utilizes Leaked LockBit and Babuk Code: "The threat actors
behind the nascent Buhti ransomware have eschewed their custom payload in favor
of leaked LockBit and Babuk ransomware families to strike Windows and Linux
systems."While the group doesn't develop its own ransomware, it does utilize
what appears to be one custom-developed tool, an information stealer designed to
search for and archive specified file types," Symantec said in a report shared
with The Hacker News."Insurance Journal — Viewpoint: Could Increasing Ransomware
Frequency Bring Back Repeat of Hard Market?: “Insurance pricing is cyclical.
When loss ratios are sustainably higher, over time prices rise in response,
creating a hard market. The last hard market in cyber was in 2021 when an
onslaught of ransomware and high-profile cyber attacks drove a spike in demand
for cyber insurance and a decreased supply of capital, which led to increased
premiums.“Once prices are higher and loss performance begins to improve, the
market looks appealing — driving new entrants and adding pressure on existing
players trying to stay competitive. This drives prices back down and creates a
soft market. Eventually, the loss ratio climbs back up, and the cycle inevitably
begins anew.”NEW RANSOMWARE TRENDS TO WATCHSo if ransomware isn't going away,
what are some important 2023 ransomware trends to watch?First, be aware that
backup repositories are targeted in 93 percent of ransomware attacks, according
to Infosecurity magazine and Veeam’s 2023 ransomware trends report: “Veeam also
found that in 93% of ransomware incidents, the threat actors target the backup
repositories, resulting in 75% of victims losing at least some of their backups
during the attack, and more than one-third (39%) of backup repositories being
completely lost."Second, the report showed that organizations are still
ill-prepared to face this threat: “Most (80%) continue to pay the ransom despite
multiple advisories against it. They primarily do that to get their data back,
yet 21% don’t, even after paying the ransom.”Third, Infosecurity magazine also
claims that the time to deploy ransomware has dropped 94 percent: “Phishing
remained the No. 1 initial access vector last year, identified in two-fifths
(41%) of incidents, followed by exploitation of public-facing applications
(26%).”FINAL THOUGHTI found this U.K. ransomware story with a twist to be
interesting: “Rogue IT worker extorted company after hijacking ransomware
attack.” Here's an excerpt: “An IT worker in the UK has been convicted of
unauthorized computer access and blackmail after attempting to take advantage of
a ransomware attack on his employer.“Ashley Liles was found to have attempted to
blackmail his employer, Oxford Biomedica, into paying a ransom in the wake of a
2018 security breach. …“Liles accessed board members’ private emails more than
300 times and altered the original ransom note to change the payment address to
his own cryptocurrency wallet.”This story just highlights the importance of
addressing insider threats and employee ethics and integrity — even during a
ransomware emergency.
May 26, 2023
Cyber Insurance Cannot Offset the Dangers of Ransomware - CPO Magazine
Data protection against ransomware and cyberattacks is becoming ... associated
with data breaches, ransomware, and other cybersecurity incidents.
May 28, 2023
Ransomware demands increasingly paid amid growing attack severity | SC Media
SiliconAngle reports that increasingly severe ransomware attacks have been
accompanied by the growing willingness to pay attackers' demands.More than 80%
of data among one in seven organizations could be compromised in ransomware
attacks, with 93% of attacks aimed at backups and 75% of those hindering
recovery efforts, while the rate of organizations paying ransoms rose by 4% to
80% in 2022 even though anti-ransomware payment policies were in effect among
41% of organizations, according to a report from Veeam.Researchers also found
that risk management programs have been in place among 87% of organizations but
only 35% noted that their programs were well-suited. Moreover, cyber insurance
coverage for ransomware attacks has also been declining, with 20% of surveyed IT
leaders citing ransomware exclusions from their policies, despite increasing
insurance costs.Organizations have been urged to conduct regular evaluations of
ransomware recoverability in their risk management plans, ensure clean backups,
and leverage a staged restoration approach in the event of a ransomware attack.
May 15, 2023
Ransomware blurs line between data backup, security | TechTarget
Data protection vendor Rubrik reintroduced itself as cybersecurity specialists
at its user conference last year, arguing the future of data backups and
disaster recovery lies in merging with security. This year, the vendor will once
again make ransomware and data security a focus of discussion as ransomware
attacks increase against enterprise customers. Even Rubrik hasn't been immune to
the fight; it suffered a data breach in March. Like other data backup vendors,
Rubrik unveiled features last year designed with cyberattacks in mind, such as
machine learning and AI tools as well as SaaS backup capabilities for Microsoft
365. These capabilities contribute the fight against ransomware, said Phil
Goodwin, research vice president at IDC. Ransomware, a risk that traditionally
falls under security's purview, remains top of mind for backup administrators.
"We see a trend among IT organizations. They are not really differentiating
between data security and data protection," Goodwin said. "The label data
protection is being applied on a more frequent basis to anomaly and intrusion
protection." How vendors respond to the dual needs of security and data
protection will become a balancing act of building useful features that don't
overpromise nor underdeliver. As Rubrik attempts to redefine itself as a
cybersecurity vendor, other backup vendors don't want to muddy the waters.
Executives at Commvault, a rival to Rubrik, are adamant their new detection and
cyber deception tools are still firmly in the realm of data backup. Backup
vendors will need to continue showing they can handle the challenges associated
with being a security company as the backups under their control are targeted
more. Western Digital, a storage vendor selling a backup SaaS, confirmed it was
the victim of a ransomware attack that knocked out services for almost two
weeks. "No one company can address it all," Goodwin said. "It's a journey.
[Rubrik is] one of the companies that has driven aggressively to address cyber
protection and cyber security from a single platform." Thin silicon line Veeam,
which will host its VeeamON 2023 conference just days following Rubrik Forward,
joined Rubrik last year in positioning itself with greater cybersecurity
features. Druva, too, added security features into its data backup platform in
2022. All these vendors are looking to posture their products as hardened
against ransomware, according to Christophe Bertrand, an analyst at TechTarget's
Enterprise Strategy Group. Ransomware attacks remain a priority for IT teams and
executives, dictating strategy and buying decisions, he said. Data backup is now
a market where vendors can better differentiate themselves depending on what
cybersecurity capabilities they offer. "We're seeing this area of cyber response
meets disaster recovery," Bertrand said. "A lot of the data protection vendors
work on their security but also improve and enhance their ability to detect
ransomware." Backup capabilities often include immutable snapshots or air gaps,
but vendors are now expanding their software to include traditional security
tools. Customers expect backup software and services to include multifactor
authentication to prevent unauthorized access and machine learning capabilities
to detect changes in data copies that could contain ransomware payloads. These
are positive additions to data backup platforms but do not replace the
comprehensive set of security features enterprise IT might need, said Jerome
Wendt, an analyst and CEO at Data Center Intelligence Group. Backup companies
might be better off going for a partnership than building in security features
themselves. "Everyone is getting a little more mature about it," Wendt said.
"I'm still not convinced those who do it themselves will do it as well as those
partnering with third parties." The cloud hyperscalers, which include AWS,
Microsoft Azure and Google Cloud Platform, have remained distant from the data
backup and data protection market, said Steve McDowell, an analyst and founding
partner of NAND Research. Outside of some simple disaster recovery offerings,
such as AWS Elastic Disaster Recovery, McDowell said the hyperscalers have
little in their portfolios attempting to replicate the features of dedicated
vendors. "It surprises me the big guys [are] not rolling out the robust feature
set," McDowell said. "That's a huge opportunity for those guys to grab and
control their customers lives a little more." SaaS data backup capabilities will
remain popular for backup vendors, analysts agreed, because many users remain
unaware of the shared responsibility model they enter into when choosing SaaS
applications or platforms. In this model, the service provider is responsible
for maintaining quality of service, and the customer is responsible for
protecting the data it uses within that service from loss, corruption or
attacks. "The adoption lags the hype pretty significantly," Goodwin said.
"[SaaS] will continue to be a growing market for a number of years."Ghost in the
air gap Like other IT vendors, Rubrik will also likely include a generative AI
narrative at this year's Rubrik Forward. The hype and saturation of generative
AI, particularly surrounding products such as OpenAI's ChatGPT, will come to the
backup space as well. But analysts said enterprise buyers will remain skeptical.
I'm still not convinced those who do it themselves will do it as well as those
partnering with third parties. Jerome WendtCEO, analyst, Data Center
Intelligence Group "It's really hard to separate the hype from the reality,"
McDowell said. "There's a little bit of AI fatigue right now." Rubrik,
Commvault, Cohesity and other backup vendors already include machine learning in
their products. Rubrik uses machine learning to find when user data has been
compromised as well as find anomalies or encryptions in backups. Cohesity is
partnering with Microsoft Azure and OpenAI to add generative AI capabilities
into data protection, such as generating readable after-action reports following
a security incident or action. AI washing will contribute to the confusion,
Bertrand said. Vendors will not use consistent language in their marketing and
will inflate AI functionality. "I haven't seen anybody come out with a clean AI
message and positioning," Bertrand said. "It's really more of an efficiency play
in the end." IT teams should still brace themselves for AI usage both for and
against them, however. Goodwin expects more ransomware gangs to take advantage
of the technology as well. "If you don't think the bad guys are going to use it
against us, you're dreaming," he said. Tim McCarthy is a journalist from the
Merrimack Valley of Massachusetts. He covers cloud and data storage news.
More articles...


LTO Social Media

 

LinkedIn

Keeping Backups Safe Using LTO Tape
Malware in the form of holding data for ransom has been a threat to
organizations for years. Ransomware attacks are getting more sophisticated and
are targeting a new class of data – backups! Ransomware will now look to delete
any type of backups it comes across, for example, any Windows backup files and
shared network drives. Learn how to defend against this type of cyberattack.
https://bit.ly/3110GdS

BlogBytes

Video Surveillance Storage Challenges
We review some alarming incidents caught on camera and what IT departments can
do to keep up with the demands of storing video surveillance content with help
from LTO technology.

Twitter


DOES YOUR ORGANIZATION USE AN ACTIVE ARCHIVE? 

Do you know the benefits of an active archive? Do you know that LTO tape storage
is used to securely archive important information and that it does it
economically? Learn more in this issue of LTO BlogBytes! #tapefortomorrow #lto
#bigdata



LTO Case Studies

Award-winning studio protects workflow with LTO Technology

Aardman is an independent and multi-award-winning studio. It produces feature
films, series, advertising, interactive entertainment and innovative attractions
for both the domestic and international market. The studio’s work includes the
creation of much-loved characters such as Wallace & Gromit, Shaun the Sheep and
Morph.



Business Needs


 *  MANAGE AND EFFICIENTLY STORE VIDEO PRODUCTION MATERIAL AT EACH PHASE OF THE
   WORKFLOW.


 * PROTECT VIDEO ASSETS FROM ANY FORM OF ACCIDENTAL OR INTENTIONAL DESTRUCTION
   AND RANSOMWARE ATTACKS.


 * CONTROL COSTS AND STAY WITHIN PLANNED BUDGET.


 * EASILY ACCESS ARCHIVED CONTENT FOR EDITS, CONFORMS, FINAL PRODUCTIONS AND
   FUTURE REFERENCE.
   

 

 

 

Solution – Results:
 




 *  IMPLEMENTED LTO TAPE DRIVES AND AUTOMATED LIBRARIES WITH ABOUT 100 SLOT
   CAPACITY.


 * PRODUCTION STAFF CAN STRAIGHTFORWARDLY
   RETRIEVE VIDEO CONTENT FROM TAPE LIBRARIES FOR ANY PHASE OF PRODUCTION.


 * ABLE TO STORE EACH STEP OF THE WORKFLOW SECURELY TO LTO TAPE.


 * EASY TO CREATE SECOND TAPE COPY OF VIDEO CONTENT TO STORE OFFSITE FOR
   DISASTER PROTECTION.

Newsbytes

LTO Tape Shipment Report
Reveals Record Breaking
Tape Capacity Shipments

July 2020

Continued increase in capacity shipments point to reliance on LTO tape in
modern-day storage environments.

The LTO Program Technology Provider Companies (TPCs), Hewlett Packard
Enterprise, IBM Corporation and Quantum today released their annual tape media
shipment report, detailing year-over-year shipments. 

The LTO Program announces Fujifilm and Sony are now both licensees of Generation
9 Technology

September 2021

LTO Seeing Continued Relevance for Archive and Offline Long-Term storage.

The LTO Program Technology Provider Companies (TPCs), Hewlett Packard
Enterprise, IBM Corporation and Quantum are pleased to announce Fujifilm and
Sony are now licensees of Generation 9 technology, meaning that both companies
are planning to produce LTO-9 media moving forward. 




Hewlett Packard Enterprise Company, International Business Machines Corporation
and Quantum Corporation collaborate and support technology specifications,
licensing, and promotions of LTO Ultrium products.

© 1999 – 2023 Hewlett Packard Enterprise, IBM and Quantum. All rights reserved.
Information subject to change without prior notice. All trademarks and
registered trademarks contained herein are the property of their respective
owners.

Linear Tape-Open LTO, the LTO logo, Ultrium and the Ultrium logo are registered
trademarks of Hewlett Packard Enterprise, IBM and Quantum in the US and other
countries.

 * Privacy Policy
 * Cookie Policy
 * Sitemap
 * Press Releases

 * Twitter
 * RSS
 * LinkedIn



This website uses cookies to ensure you get the best experience on our
website.GOT IT!LEARN MORE