We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Stonefly Podcasts
Just a fraction of the species on our planet are known to science, but more are described and published every day. This podcast talks to the authors of these new species to get the behind-the-scenes stories of how new species are found and named, as well as why these discoveries should matter to everyone, not just scientists. Join us on our journey to better understand the wonderful biodiversity of our planet! Be sure to follow New Species on Twitter (@PodcastSpecies), and support the podcas ...
…
continue reading
Stoneflies, or Plecoptera, are an order of insects with around 4,000 species. But that’s about to change. In her paper “Stonefly systematics: past, present, and future,” Anna Eichert and her colleagues from around the world map out the way stoneflies have changed as a group over time, some of the factors that shape our current understanding of the …
…
continue reading
1
New Adelopsis Beetles with Eduardo Gomyde
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41The genus Adelopsis is one of the many groups of LBB’s, ‘little brown beetles’ that often get left behind or unidentified by researchers. Eduardo Gomyde is a scientist giving them a closer look. “We're not just identifying species,” he explains, “but we are also analyzing and understanding the finer scale of the [features] that help us to different…
…
continue reading
1
Three New Lichens with Erin Manzitto-Tripp
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18How much do you know about lichens? These incredible taxa are understudied, but today’s guest is making sure they’re not undervalued. “You can’t look at lichens under a microscope and not become immediately obsessed,” says Dr. Erin Manzitto-Tripp. “It’s an endless world of magnificent, beautiful biodiversity.” Erin works in the mountains of Colorad…
…
continue reading
1
Three New Fossil Dictyopterans with Soo Bin Lee
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50The Cretaceous insects in the family Umenocoleidae have been difficult to classify, but for Soo Bin Lee they are a window into one of the most interesting periods of our prehistoric world. While closely related to the modern cockroaches in order Blattodea, fossil Umenocoleids have been found and researched across the world and found to be present a…
…
continue reading
Do you have a love of holometabolic insects? Ivonne Garzón is the president of their fan club! She studies a subset of geometrid moths that may look drab, but their colorful caterpillars and relationships with toxic plants make them endlessly interesting. “There is no way to get bored,” Ivonne says, “There is no way! You are amazed all the time.” T…
…
continue reading
1
Un Nuevo Puercoespín con Héctor Ramírez-Chaves
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50Los puercoespines, una de las criaturas más adorables y dolorosas a la vez, captan la atención en toda su área de distribución mundial. En este artículo, Héctor Ramírez-Chaves y sus coautores describen una nueva especie de puercoespín de los Andes colombianos. El trabajo los ha llevado a recorrer diferentes ecosistemas y a numerosos museos internac…
…
continue reading
1
A New Porcupine with Héctor Ramirez-Chaves
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21Simultaneously one of the cutest and most pain-inducing creatures, porcupines capture attention all over their worldwide range. In this paper, Héctor Ramirez-Chaves and his coauthors describe a new species of porcupine from the Andes of Colombia. The work has taken them across different ecosystems and to a good handful of international museums. As …
…
continue reading
1
A New (Old) Apple with Todd, Cameron, and John
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50The moment John Bunker saw the 200+ year old tree, he knew it might be special. He had no idea however, that it was one of America’s oldest surviving apple trees, a French ancestor to many of the apple varieties we know and love today. Combining Todd Little-Siebold’s historical research and Cameron Peace’s genetic work, in this special interview th…
…
continue reading
1
A New Butterfly with Zac MacDonald and Julian Dupuis
52:52
52:52
Play later
Play later
Lists
Like
Liked
52:52Think butterfly genomics is a simple topic? Think again, but this time think alongside Zac MacDonald and Julian Dupuis. Not only are they answering some of the most interesting contemporary conservation questions, but they’re doing so using a very curious butterfly as their model organism. “One of the difficult things with studying these kinds of b…
…
continue reading
Deep-sea isopods come in all shapes and sizes, and Henry Knauber is excited to see all of them. In this paper, he and his coauthors describe five new species and redescribe another as part of a large expedition to examine the biodiversity of the Kuril-Kamchatka Trench region of the northwest Pacific Ocean. These new species are part of what he call…
…
continue reading
1
A New Toxungenous Scorpion with Léo Laborieux
33:38
33:38
Play later
Play later
Lists
Like
Liked
33:38“Serendipity is a real grabbing force of science,” says Léo Laborieux as he shares his experience describing his new species of scorpion. While at a remote research station in the Colombian rainforest, Léo found a handful of scorpions that exhibited a unique venom ‘flicking’ behavior. Armed only with his phone and a few basic supplies, Léo document…
…
continue reading
1
Brute Force Attacks Unlocked: How Hackers Guess Their Way In
19:18
19:18
Play later
Play later
Lists
Like
Liked
19:18In this episode, we dive deep into the world of brute force attacks—one of the oldest yet still dangerously effective cyberattack methods. We unpack what brute force attacks are, how they work, and the variety of forms they take, from simple password-guessing scripts to sophisticated methods like credential stuffing, hybrid attacks, and rainbow tab…
…
continue reading
Begonias are known around the world as a plant of beauty and diversity. What can they teach us about the world around us? Through his work on Begonias and other flowering plants found in Northeast India, Professor Dipankar Borah sees the world differently. It’s not just for his own benefit though. “Much of my time is spent making students aware of …
…
continue reading
1
A New Bee Fly with Lisa Rollinson and Allan Cabrero
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06For some people, a box of 100-year-old bee flies might seem daunting, but for Lisa Rollinson and Allan Cabrero, It was an exciting challenge. As part of a Smithsonian-based internship, Lisa worked with Allan to identify the flies, creating a new key for several genera and discovering a new species along the way. Flies aren’t the most charismatic gr…
…
continue reading
Shantanu Joshi is fascinated with creatures of all kinds, but especially damselflies, the small quick fliers of the order Odonata. In this episode he takes us deep into the forests of Northeast India, a place of immense beauty and interfering colonial history. Undersampling and poor specimen quality are a few reasons the diversity of this area is n…
…
continue reading
1
From 3-2-1 to 4-3-2: How Many Backup Copies Are Enough?
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13When it comes to protecting your data, not all backup strategies are created equal. In this episode, we dig deep into the evolution of backup best practices — starting with the tried-and-true 3-2-1 method, moving to the more resilient 3-2-1-1-0, and finally unpacking the enterprise-grade 4-3-2 model. We’ll explore why each strategy was created, wha…
…
continue reading
1
XDR vs MDR vs EDR vs NDR – What’s the Right Fit for Your Security Stack?
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45In this episode, we break down four of the most talked-about cybersecurity technologies—EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), XDR (Extended Detection and Response), and NDR (Network Detection and Response). You’ll learn: How EDR tools provide real-time endpoint visibility and behavioral analytics to detect mal…
…
continue reading
1
StoneFly Secures Veeam Backups & Disaster Recovery: A Game-Changer in Data Protection
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17In this deep dive episode, we break down the StoneFly DR 365V, an all-in-one backup and disaster recovery solution that addresses data protection, compliance, and scalability. Whether you're a small business or managing enterprise-level data, this episode explores the key features of the DR 365V, including its hardware options, SCVM software, Veeam…
…
continue reading
1
Backups, Recovery, and Continuity: Understanding BaaS, RaaS, and DRaaS
11:18
11:18
Play later
Play later
Lists
Like
Liked
11:18Not all data recovery services are created equal. In this episode, we break down the core differences between Backup as a Service (BaaS), Recovery as a Service (RaaS), and Disaster Recovery as a Service (DRaaS)—three acronyms often confused but with radically different capabilities, costs, and outcomes. We use relatable analogies and real-world exa…
…
continue reading
1
Immutable Backups: Your Cyber Insurance Lifeline
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode, we dive into the growing link between cyber insurance eligibility and immutable backups. As ransomware attacks become more frequent and sophisticated, insurance providers are tightening requirements—and businesses that can’t prove solid data protection may face steep premiums or outright denial of coverage. We explore: The rise in …
…
continue reading
1
From Backups to Real-Time Mirrors: Making Sense of Data Replication Strategies
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04"Replication isn’t just a technical checkbox—it’s your digital insurance policy." In this episode, we dive deep into the four most common data replication methods—array-based, host-based, hypervisor-based, and network-based—and unpack their unique advantages, limitations, and ideal use cases. Whether you’re safeguarding financial data, powering vir…
…
continue reading
What if I told you that the oldest known biotic association of arthropods is a piece of Lebanese amber from the Cretaceous period? At the same time that flowering plants were diversifying, astigmatid mites were finding a very convenient way to get around: on the backs of termites. Can mites and termites be friends? How does one identify a tiny mite…
…
continue reading
1
Building AI/ML Data Lakes: Why S3 Object Storage Outperforms Traditional Storage
19:45
19:45
Play later
Play later
Lists
Like
Liked
19:45AI and machine learning (ML) demand massive amounts of data, seamless scalability, and high-speed access—which is why traditional storage solutions often fall short. S3 object storage is rapidly becoming the go-to solution for AI/ML data lakes, enabling organizations to handle vast datasets efficiently and cost-effectively. In this episode, we expl…
…
continue reading
1
ESXiArgs Ransomware: A Silent Threat to VMware Servers
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11The ESXiArgs ransomware attack is a wake-up call for organizations relying on VMware ESXi servers for virtualization. Targeting unpatched and vulnerable systems, this ransomware encrypts virtual machines, leaving businesses locked out of their critical workloads. In this episode, we uncover: 🔹 How ESXiArgs ransomware infiltrates VMware environments…
…
continue reading
1
Medical Data at Risk? How to Store & Protect Patient Records
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52As hospitals and healthcare providers transition from paper to digital, medical record storage and archiving have become critical challenges. From electronic health records (EHRs) to PACS imaging systems, healthcare organizations must manage massive volumes of sensitive patient data while ensuring compliance with HIPAA and other regulations. In thi…
…
continue reading
1
AI Workloads Demand More—Is Your Storage Ready?
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40AI workloads are pushing traditional IT infrastructure to its limits. In this episode, we break down how AI storage and servers must evolve to handle massive datasets, high-speed processing, and scalable performance. We’ll explore key challenges like latency, bandwidth, and the role of NVMe SSDs, high-capacity storage tiers, and GPU acceleration. J…
…
continue reading
1
Ransomware vs. Manufacturing: How Ransomware Disrupts Production Lines
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50Manufacturing is under attack. Ransomware is rapidly becoming one of the biggest threats to industrial operations, bringing production lines to a halt, disrupting supply chains, and costing businesses millions in lost revenue. In this episode, we dive into the alarming rise of ransomware in the manufacturing sector, exploring how cybercriminals tar…
…
continue reading
1
Volume Deletion Protection: The Ultimate Fail-Safe for Ransomware, Human Error, and Accidental Deletion
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19Data loss isn’t always caused by hardware failures—it can happen through accidental deletions, insider threats, and ransomware attacks that target storage volumes. In this episode, we break down Volume Deletion Protection, a critical safeguard that keeps your data intact even when disaster strikes. 🔹 What is Volume Deletion Protection and how does …
…
continue reading
1
Ransomware vs. Healthcare: The Silent Crisis in Hospitals
15:41
15:41
Play later
Play later
Lists
Like
Liked
15:41Hospitals and healthcare providers are on the frontlines of a growing cyber crisis—ransomware attacks that lock down critical systems, disrupt patient care, and put lives at risk. In this episode, we dive into how ransomware is crippling the healthcare industry and what can be done to stop it. 🔹 Why healthcare is one of the biggest targets for cybe…
…
continue reading
1
Education Under Attack: How Schools Can Secure Their Backups
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45Schools, colleges, and universities are storing more data than ever—from student records and research data to online learning platforms. But with the rise of ransomware, accidental deletions, and system failures, how can educational institutions ensure their data stays safe, accessible, and recoverable? In this episode, we break down the backup and…
…
continue reading
1
How Immutable Snapshots Stop Ransomware Attacks in Their Tracks
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54Ransomware is evolving, and attackers aren’t just encrypting your files—they’re deleting your backups to leave you with no way out. So, how do you fight back? Immutable snapshots. In this episode, we dive into how immutable snapshots work, why they’re the best defense against ransomware, and how you can set them up on your NAS storage. Unlike tradi…
…
continue reading
1
Backup Defense 101: Stopping Ransomware from Encrypting Your Data
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51Backups are your last line of defense against ransomware attacks—but what if ransomware can delete them too? Many organizations assume that having backups means they’re safe, but modern ransomware actively targets and destroys backups before demanding a ransom. In this episode, we break down how ransomware finds, encrypts, and deletes backup data, …
…
continue reading
1
Lynx Ransomware: The Stealthy Cyber Threat You Need to Know
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44Ransomware threats are constantly evolving, and Lynx ransomware is one of the latest and most dangerous strains making headlines. But what makes this malware so effective? And how can businesses defend against it? In this episode, we take a deep dive into how Lynx ransomware infiltrates systems, encrypts critical data, and demands hefty ransoms fro…
…
continue reading
1
Beyond Passwords: Why Multi-Factor Authentication is a Must
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43In today’s digital world, passwords alone aren’t enough to keep cybercriminals out. Multi-Factor Authentication (MFA) has become a critical security measure, adding an extra layer of protection against unauthorized access, data breaches, and identity theft. But how does it really work? And why are some businesses still not using it? In this episode…
…
continue reading
1
Ransomware vs. Finance: How Cybercriminals Target Banks and Institutions
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16Banks, credit unions, and financial institutions are prime targets for ransomware attacks, with cybercriminals seeking to steal sensitive financial data or hold entire networks hostage for massive payouts. The financial sector faces a relentless wave of cyber extortion, with devastating consequences—including service disruptions, regulatory fines, …
…
continue reading
1
Ransomware as a Service (RaaS): How Hackers Sell Cybercrime
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52Ransomware is no longer just a tool for elite hackers—it’s now a service for sale on the dark web. Ransomware-as-a-Service (RaaS) has transformed cybercrime, allowing even low-skilled attackers to launch devastating ransomware campaigns against businesses, governments, and individuals. In this episode, we break down how RaaS works—from its subscrip…
…
continue reading
1
When Cars Stop Rolling: The Cost of Ransomware Attacks on Automakers
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16Ransomware attacks are wreaking havoc on the automotive industry, bringing production lines to a grinding halt and costing manufacturers millions in downtime and recovery. But why is this industry such a prime target? In this episode, we break down how ransomware infiltrates automotive supply chains, assembly lines, and dealerships, exposing critic…
…
continue reading
1
LockBit 3.0 & Beyond: The Ransomware Threat That Keeps Evolving
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08In this episode, we dive deep into LockBit ransomware, a modern cyber threat that’s making headlines worldwide. We’ll explore how LockBit operates—from its initial intrusion methods to the sophisticated encryption techniques it uses to hold organizations hostage. Discover the tactics behind its rapid data encryption, and learn about the double exto…
…
continue reading
1
Inside Conti Ransomware’s Arsenal: Tactics, Techniques, and Threats
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59In this episode, we dive deep into Conti ransomware, one of today’s most notorious cyber threats. We explore how Conti infiltrates networks, the sophisticated methods it uses to encrypt data, and its infamous double extortion tactics. By breaking down Conti’s technical architecture—from its initial breach and infection strategies to the robust encr…
…
continue reading
1
AI in 2025: Game-Changing Tools & The Power of StoneFly Appliances
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41AI is evolving faster than ever—are you keeping up? In this episode, we break down the most impactful AI tools of 2025, from text-to-speech advancements to game-changing productivity hacks. Whether you're a creator, entrepreneur, or tech enthusiast, discover how AI can streamline your work, spark creativity, and revolutionize entire industries. Plu…
…
continue reading
1
Remote Access Trojans Exposed: How Hackers Take Control
13:37
13:37
Play later
Play later
Lists
Like
Liked
13:37In this episode, we dive into the world of Remote Access Trojans (RATs) — malicious software that gives cybercriminals stealthy control over your systems. We break down how RATs work, from their initial infection to the way they provide attackers with complete remote access. Drawing from real-world examples and expert analysis, we discuss the tacti…
…
continue reading
1
Deploying StoneFly SA365: Enhancing Cybersecurity with SIEM
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59In this episode, we dive into the deployment of the StoneFly SA365 Cybersecurity SIEM Appliance, exploring how it strengthens security by providing real-time threat detection, log management, and compliance solutions. Learn how organizations can enhance their cybersecurity posture, streamline incident response, and protect critical data with this p…
…
continue reading
1
Man-in-the-Middle Attacks: How Hackers Hijack Your Data
21:47
21:47
Play later
Play later
Lists
Like
Liked
21:47Your internet connection might not be as secure as you think. Man-in-the-Middle (MITM) attacks allow hackers to secretly intercept your communications, steal sensitive data, and even alter transactions—without you ever noticing. In this episode, we break down MITM attacks, explaining how they work and why they’re more common than most people realiz…
…
continue reading
1
The Akira Ransomware Playbook: Tactics, Targets, and Defenses
17:18
17:18
Play later
Play later
Lists
Like
Liked
17:18Ransomware attacks are evolving, and Akira ransomware is quickly becoming a major threat to businesses worldwide. But what makes Akira different from other ransomware strains? And more importantly—how can organizations defend against it? In this episode, we break down Akira ransomware step by step—how it infiltrates networks, encrypts data, and dem…
…
continue reading
1
Botnets Breakdown: From Zombies to Command Centers
23:23
23:23
Play later
Play later
Lists
Like
Liked
23:23In this gripping episode, we dive into the hidden world of botnets—massive networks of hijacked devices controlled by cybercriminals. These digital armies are responsible for launching devastating attacks, from crippling DDoS campaigns to massive data breaches. But what exactly makes botnets so dangerous, and how can organizations defend against th…
…
continue reading
1
SQL Injection: The Hacker’s Backdoor to Your Data
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38Did you know a single line of malicious code could expose your entire database to hackers? SQL Injection (SQLi) remains one of the most dangerous and widely used cyberattack techniques, allowing attackers to manipulate databases, steal sensitive data, and even take full control of applications. In this episode, we dive deep into how SQL injection w…
…
continue reading
1
Unveiling StoneFly: The Future of Enterprise Data Management
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37Data is more than just storage—it's about security, efficiency, and innovation. In this deep dive, we explore how StoneFly.com is transforming enterprise data management with high-performance storage solutions, hybrid cloud integration, and cutting-edge disaster recovery. Whether you're dealing with petabytes of data or ensuring compliance in regul…
…
continue reading
1
DDoS Attacks Decoded: How Hackers Take Down Networks
19:00
19:00
Play later
Play later
Lists
Like
Liked
19:00Imagine your website, servers, or entire business grinding to a halt—not because of a technical failure, but because of a massive, coordinated cyberattack. DDoS (Distributed Denial-of-Service) attacks have become one of the biggest threats to businesses, governments, and online services worldwide. But how do they work, and why are they so hard to s…
…
continue reading
1
The Long Game: How APTs Infiltrate, Persist, and Steal Data
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18Cyberattacks are getting smarter, but few threats are as stealthy and devastating as Advanced Persistent Threats (APTs). Unlike typical cyberattacks, APTs operate over months or even years, quietly infiltrating systems, stealing sensitive data, and evading detection. In this episode, we dive deep into the world of APTs—how they work, who they targe…
…
continue reading
1
A New Woolly Devil with Isaac Lichter Marck
46:53
46:53
Play later
Play later
Lists
Like
Liked
46:53Sunflowers come in all shapes and sizes, and the group has gained a new member. Nicknamed the “woolly devil,” Ovicula biradiata is the product of the amazing bi-national collaboration between taxonomists, conservationists, and community scientists in Big Bend National Park. But it comes at a time when the future of National Parks is uncertain. “I t…
…
continue reading