<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Commvault Archives - Deliver Intelligence - Dibiz JSC</title>
	<atom:link href="https://dibiz.vn/en/category/commvault-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://dibiz.vn/en/category/commvault-en/</link>
	<description></description>
	<lastBuildDate>Tue, 07 Oct 2025 03:00:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://dibiz.vn/wp-content/uploads/2025/06/cropped-cropped-cropped-cropped-3-1-32x32.png</url>
	<title>Commvault Archives - Deliver Intelligence - Dibiz JSC</title>
	<link>https://dibiz.vn/en/category/commvault-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Future-Proofing Your Data: Post-Quantum Cryptography and Beyond Bảo Mật Dữ Liệu Lượng Tử: Mật Mã Hậu Lượng Tử &#038; Tương Lai</title>
		<link>https://dibiz.vn/en/future-proofing-your-data-post-quantum-cryptography-and-beyond-bao-mat-du-lieu-luong-tu-mat-ma-hau-luong-tu-tuong-lai/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 03:00:12 +0000</pubDate>
				<category><![CDATA[Commvault]]></category>
		<guid isPermaLink="false">https://dibiz.vn/?p=996684</guid>

					<description><![CDATA[<p>Enter the looming threat of quantum computing. These powerful machines harness the power of quantum mechanics to solve problems more quickly than traditional computers. This includes cracking the key and encryption standards that safeguard our world of data. &#160; This is where post-quantum cryptography (PQC) comes in, and why Commvault has chosen to implement it...</p>
<p>The post <a href="https://dibiz.vn/en/future-proofing-your-data-post-quantum-cryptography-and-beyond-bao-mat-du-lieu-luong-tu-mat-ma-hau-luong-tu-tuong-lai/">Future-Proofing Your Data: Post-Quantum Cryptography and Beyond Bảo Mật Dữ Liệu Lượng Tử: Mật Mã Hậu Lượng Tử &amp; Tương Lai</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper">Enter the looming threat of quantum computing. These powerful machines harness the power of quantum mechanics to solve problems more quickly than traditional computers. This includes cracking the key and encryption standards that safeguard our world of data.  </p>
<p>&nbsp;</p>
<p>This is where post-quantum cryptography (PQC) comes in, and why <a href="https://dibiz.vn/commvault/">Commvault</a> has chosen to implement it to safeguard your data.    </p>
<p>&nbsp;</p>
<h2><strong>Why We Need PQC</strong></h2>
<p>&nbsp;</p>
<p>Many of the asymmetric and symmetric cryptography algorithms we use to protect data from prying eyes rely on mathematical problems factoring in large numbers</p>
<p>&nbsp;</p>
<ul>
<li><strong>While these are difficult for classical computers to crack, quantum computers solve these mathematical problems significantly faster, making what was once thought impossible very much possible.</strong></li>
<li>This could leave any sensitive information that is normally encrypted, such as credentials, emails, financial data, and medical records, exposed.</li>
</ul>
<p>&nbsp;</p>
<p>You might think the threat of quantum computing is five to ten years away, but anyone who recently attended the keynote at Ignite/Reinvent/Next would know that quantum computing resources are already available and the technology is rapidly advancing. And now it’s available to anyone, including malicious actors. The question is, how do you shield your organization? </p>
<p>&nbsp;</p>
<p>.    </p>
<p>&nbsp;</p>
<h2><strong>A Multi-Faceted Approach: Bigger Keys, Better Locks, and PQC</strong></h2>
<p>&nbsp;</p>
<p>Although full-fledged PQC algorithms are still on the way to being standardized, there are steps we can take now to bolster our defenses. One approach is to increase cryptography key lengths on symmetric algorithms, so it takes a longer time to crack encryption with brute-force attacks. This is very similar in principle to increasing the number of pins in a tumbler lock. The more pins the lock utilizes, the more difficult and time consuming it is to crack. The larger and more complex the key is, the harder and longer it takes to replicate or guess.     </p>
<p>&nbsp;</p>
<h2><strong>Secure Post-Quantum Data Encryption</strong></h2>
<p>&nbsp;</p>
<p>AES encryption has long been the industry standard algorithm for secure symmetric encryption, and in the near term it will continue to be relatively sufficient in securing against quantum brute-force attacks, as long as high key sizes are utilized. Commvault already has standardized data encryption on AES-256, which is the highest supported key length for AES. </p>
<p>&nbsp;</p>
<p>To put things into perspective, we can look at <a href="https://www.geeksforgeeks.org/dsa/introduction-to-grovers-algorithm/">Grover’s algorithm</a> to demonstrate the potential threat of brute-force attacks. Grover’s algorithm is a commonly known algorithm used to solve complicated mathematical problems. It also can be used to speed up password brute-force attacks, especially when executed on quantum computers.  </p>
<p>&nbsp;</p>
<p>With Grover’s algorithm, the time to crack AES-256 encryption still would be impractical due to the key size (it effectively halves the key size) and because the current generation of quantum computers is not quite powerful enough. So, AES-256 is still a viable encryption algorithm in the foreseeable future. </p>
<p>&nbsp;</p>
<h2><strong>Secure Post-Quantum Communication</strong></h2>
<p>&nbsp;</p>
<p>When it comes to the asymmetric encryption algorithms (public-key cryptography) that are used for secure communication and digital signatures, things look bleak. This is one of the cryptographic areas at highest risk of impact by quantum computing since RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography) algorithms are severely weakened by quantum computers.  </p>
<p>&nbsp;</p>
<p>Following public calls to action to develop PQC standards, the National Institute of Standards and Technology (NIST) coordinated the solicitation, evaluation, and selection of candidate algorithms for PQC starting in 2016. As of December 2023, the final post-quantum algorithms have been selected, and NIST has begun drafting the <a href="https://csrc.nist.gov/Projects/post-quantum-cryptography/publications">standard guidance and publications </a>around them. </p>
<p>&nbsp;</p>
<p>Commvault has taken the first steps in incorporating some of the upcoming PQC standards to improve secure communication. Two key components needed to be updated to provide quantum protection: </p>
<p>&nbsp;</p>
<ul>
<li>Key exchange and encapsulation: Establishes a symmetric encryption key during TLS setup.</li>
<li>Signature generation and verification: Creates a chain of certificates and authenticates parties involved in the TLS setup, preventing man-in-the-middle attacks.</li>
</ul>
<p>&nbsp;</p>
<p>The traditional key exchange algorithm, ECDH (Elliptic-curve Diffie-Hellman), is susceptible to attacks with the advent of quantum computers. CRYSTALS-Kyber, a NIST-approved post-quantum algorithm, serves as a replacement for ECDH. </p>
<p>&nbsp;</p>
<p>However, a secure TLS connection requires more than just key exchange. Both ECDH and Kyber are vulnerable to man-in-the-middle attacks. This necessitates the use of a certificate chain and signed/verified messages during TLS setup. Conventional cryptography relies on RSA with large private/public key sizes (2048, 3072, etc.) for this purpose. NIST has recommended post-quantum alternatives for RSA, which includes:    </p>
<p>&nbsp;</p>
<ul>
<li>CRYSTALS-Dilithium3</li>
<li>Falcon</li>
<li>Sphincs+</li>
</ul>
<p>&nbsp;</p>
<h2><strong>Today’s Best Combo</strong></h2>
<p>&nbsp;</p>
<p>Customers immediately can begin securing their environment against quantum-based attacks starting in the most recent software release, Commvault Cloud CPR 2024, which leverages <strong>CRYSTALS-Kyber</strong> for key encapsulation, and CRYSTALS-Dilithium3 or FALCON for digital signature schemes, to provide secure communication within the Commvault® Cloud platform. </p>
<p>&nbsp;</p>
<p>Once enabled, data communication within Commvault will be resistant to quantum attacks, while your data is encrypted at its source with AES-256 algorithm, keeping your data safe from modern and future quantum threats. Given that the quantum space is under rapid development, along with additional scrutiny of these algorithms, Commvault Cloud has implemented a flexible framework that allows selection of other algorithms and key lengths, for both key exchange/encapsulation and signature generation/verification, providing a futureproof way to remain vigilant in this ever-changing space. </p>
<p>&nbsp;</p>
<h2><strong>The Road Ahead</strong></h2>
<p>&nbsp;</p>
<p>As with all security measures, PQC is yet another layer to implement on top of other security controls to keep you cyber resilient. We recommend using Security IQ to gain insights into your own security posture and implement controls to keep your data safe from quantum and other attack vectors. </p>
<p>&nbsp;</p>
<p>Similar to how trust is a continuous process, Commvault’s continual investment in cyber resilience and quantum protection will keep your data safe against ever-evolving threats. You can learn more about Security IQ here.  </p>
<p>&nbsp;</p>
<p><em>Lưu ý: Để duy trì hiệu quả của các biện pháp bảo mật, hãy xem xét và cập nhật thông tin định kỳ (ví dụ: 6 tháng/1 năm) để đảm bảo tính chính xác, đầy đủ và phù hợp theo thời gian, đặc biệt với các chủ đề thay đổi nhanh hoặc nội dung &#8220;evergreen&#8221;.</em></p>
<p>&nbsp;</p>
<h2><strong>Câu Hỏi Thường Gặp (FAQs) về Mật Mã Hậu Lượng Tử</strong></h2>
<p>&nbsp;</p>
<h3><strong>1. Mật mã hậu lượng tử (PQC) là gì?</strong></h3>
<p><strong>Mật mã hậu lượng tử</strong> là một lĩnh vực nghiên cứu trong mật mã học tập trung vào việc phát triển các thuật toán có khả năng chống lại các cuộc tấn công từ máy tính lượng tử hiện tại và tương lai. Mục tiêu là đảm bảo mã hóa an toàn trong kỷ nguyên lượng tử. </p>
<p>&nbsp;</p>
<h3><strong>2. Tại sao máy tính lượng tử lại là mối đe dọa đối với mật mã hiện tại?</strong></h3>
<p><strong>Máy tính lượng tử</strong> có khả năng phá vỡ các thuật toán mật mã khóa công khai phổ biến như RSA và ECC, vốn là nền tảng của <strong>mã hóa an toàn</strong> trên Internet hiện nay. Chúng có thể giải quyết các bài toán toán học phức tạp mà mật mã hiện tại dựa vào một cách nhanh chóng hơn nhiều. </p>
<p>&nbsp;</p>
<h3><strong>3. Các tiêu chuẩn PQC được phát triển như thế nào?</strong></h3>
<p>Các <strong>Tiêu chuẩn PQC</strong> được phát triển thông qua các quy trình toàn cầu, nổi bật là chương trình của NIST (Viện Tiêu chuẩn và Công nghệ Quốc gia Hoa Kỳ). NIST đã tổ chức các cuộc thi để lựa chọn các thuật toán hậu lượng tử mạnh mẽ nhất, sau đó sẽ ban hành các hướng dẫn tiêu chuẩn cho việc triển khai chúng nhằm đảm bảo <strong>bảo mật dữ liệu lượng tử</strong>. </p>
<p>&nbsp;</p>
<h3><strong>4. Mã hóa AES-256 có đủ mạnh để chống lại các cuộc tấn công lượng tử không?</strong></h3>
<p>Mã hóa <strong>Mã hóa AES-256</strong> được coi là tương đối an toàn trước các cuộc tấn công vét cạn lượng tử trong tương lai gần, chủ yếu nhờ vào kích thước khóa lớn. Tuy nhiên, nó vẫn cần được sử dụng trong một chiến lược bảo mật toàn diện bao gồm cả các giải pháp <strong>Mật mã hậu lượng tử</strong> cho các thành phần khác. </p>
<p>&nbsp;</p>
<h3><strong>5. Làm thế nào để doanh nghiệp chuẩn bị cho kỷ nguyên hậu lượng tử?</strong></h3>
<p>Để <strong>bảo vệ dữ liệu tương lai</strong>, các doanh nghiệp nên bắt đầu đánh giá các hệ thống mật mã hiện có, theo dõi sự phát triển của Tiêu chuẩn PQC và xem xét các giải pháp kết hợp như việc Commvault đã triển khai CRYSTALS-Kyber và Dilithium3. Việc này là một phần quan trọng của khả năng phục hồi không gian mạng dài hạn. </p>
<p>&nbsp;</p>
<p>Đừng để dữ liệu của bạn dễ bị tổn thương trước các mối đe dọa lượng tử trong tương lai. Tìm hiểu thêm về các giải pháp <strong>Mật mã hậu lượng tử</strong> của Commvault và cách chúng tôi giúp bạn xây dựng <strong>khả năng phục hồi không gian mạng</strong> vững chắc. <strong><br />
  <a href="https://dibiz.vn/contact/">Liên hệ với chúng tôi ngay hôm nay để được tư vấn và bảo vệ tương lai dữ liệu của bạn</a><br />
</strong>! </p>
<p><!-- notionvc: 03f8a348-b0e3-47e0-aeaf-cc53fec9c645 --></div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/future-proofing-your-data-post-quantum-cryptography-and-beyond-bao-mat-du-lieu-luong-tu-mat-ma-hau-luong-tu-tuong-lai/">Future-Proofing Your Data: Post-Quantum Cryptography and Beyond Bảo Mật Dữ Liệu Lượng Tử: Mật Mã Hậu Lượng Tử &amp; Tương Lai</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Seminar on Cyber Resilience: Building a Proactive and Sustainable Defense Strategy</title>
		<link>https://dibiz.vn/en/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/</link>
		
		<dc:creator><![CDATA[tiếp thị]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 10:25:44 +0000</pubDate>
				<category><![CDATA[Commvault]]></category>
		<category><![CDATA[Events]]></category>
		<guid isPermaLink="false">https://dibiz.vn/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/</guid>

					<description><![CDATA[<p>In the face of cybersecurity threats that are growing in both scale and sophistication, establishing a proactive and sustainable defense strategy has become a paramount priority for all enterprises. Recognizing this critical need, the seminar &#8220;Best Practices &#38; Solution Architecture toward Cyber Resilience&#8221; was recently held successfully, bringing together leading experts from DIBIZ, UNITAS VIETNAM,...</p>
<p>The post <a href="https://dibiz.vn/en/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/">Seminar on Cyber Resilience: Building a Proactive and Sustainable Defense Strategy</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper"><strong>In the face of cybersecurity threats that are growing in both scale and sophistication, establishing a proactive and sustainable defense strategy has become a paramount priority for all enterprises. Recognizing this critical need, the seminar &#8220;Best Practices &amp; Solution Architecture toward Cyber Resilience&#8221; was recently held successfully, bringing together leading experts from DIBIZ, UNITAS VIETNAM, Commvault, VNPT SI, and VNPT Cyber. </strong></p>
<p>&nbsp;</p>
<p>The event served not only as a platform to share the latest technological trends but also as a forum for leaders and IT professionals to discuss and seek solutions to the complex challenges of data protection and recovery in the digital age.</p>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-996656" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-300x199.jpg" alt="" width="650" height="431" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-300x199.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-1024x678.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-768x509.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-1536x1017.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3861-2048x1356.jpg 2048w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
<p>In the opening remarks, representatives from Commvault emphasized the critical importance of shifting the mindset from passive defense to building a robust, self-recovering system architecture. The seminar&#8217;s objective was not merely to introduce products, but to collaboratively shape a comprehensive, effective, and practical cybersecurity strategy tailored to the specific context of Vietnam. </p>
<p>&nbsp;</p>
<h2><strong>In-Depth Sessions: From Global Perspectives to Localized Solutions</strong></h2>
<p>&nbsp;</p>
<h3><strong>1. Commvault: Building a Solid Architecture for Cyber Resilience</strong></h3>
<p>&nbsp;</p>
<p>Kicking off the in-depth presentations, Mr. Chee Peng Mak, Senior Solutions Specialist from Commvault, introduced a progressive concept: &#8220;Uninterrupted Business Operations.&#8221; The core of this vision is to achieve &#8220;Minimum Viable Operations&#8221;—a critical milestone that defines the minimum set of systems, data, and processes that must be restored for a business to resume operations immediately after a disruption. </p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-996658" src="https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-300x192.jpg" alt="" width="655" height="419" srcset="https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-300x192.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-1024x655.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-768x491.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-1536x982.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/IMG_4850-1-2048x1310.jpg 2048w" sizes="(max-width: 655px) 100vw, 655px" /></p>
<p>&nbsp;</p>
<p>The session highlighted alarming statistics: 99% of ransomware attacks attempt to destroy backups, and the average time to recover from a cyber incident is 24 days. This underscores that &#8220;Cyber Recovery&#8221; is significantly more challenging than traditional &#8220;Disaster Recovery.&#8221; To address this, Commvault presented a comprehensive workflow, from threat remediation and infrastructure rebuilding to restoring access (Active Directory) and recovering data safely through advanced technologies like Cleanroom Recovery and Air Gap Protect. As a 14-time consecutive leader in the Gartner® Magic Quadrant<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, Commvault continues to affirm its outstanding capabilities in this field.   </p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-996660" src="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-300x169.png" alt="" width="650" height="366" srcset="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-300x169.png 300w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-1024x576.png 1024w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-768x432.png 768w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-1536x864.png 1536w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.05.42-pm-2048x1152.png 2048w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
<h3><strong>2. VNPT SI and VNPT Cyber: The Integrated Strength of Vietnam&#8217;s Technology Ecosystem</strong></h3>
<p>&nbsp;</p>
<p>Following Commvault, Mr. Tran Manh Tuan, Product Director of Corporate Governance Services <span class="discussion-id-26ce8e41-5bae-8095-9dbc-001c41080ff1 notion-enable-hover" data-token-index="1">at</span> <!-- notionvc: e8b520a2-c94d-4672-bf74-0b63c31027e1 -->VNPT SI, offered a practical perspective on Vietnam&#8217;s digital transformation landscape and how VNPT supports businesses on this journey. His presentation analyzed two major challenges commonly faced by enterprises: </p>
<p>&nbsp;</p>
<ul>
<li>For Small and Medium-sized Enterprises (SMEs): They often start with standalone software, leading to fragmented applications, inconsistent data, and a lack of dedicated IT personnel.</li>
<li>For Large Enterprises/Corporations: While having invested in large-scale systems (ERP, CRM), they face challenges with data scattered across different &#8220;silos,&#8221; being trapped in legacy systems, and difficulties in consolidating management reports.</li>
</ul>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996662" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-300x199.jpg" alt="" width="650" height="431" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-300x199.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-1024x678.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-768x509.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-1536x1017.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3899-2048x1356.jpg 2048w" sizes="(max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
<p>VNPT demonstrated its leading position with a dominant market share in foundational services such as digital signatures (26.5%) and e-invoices (25%). Building on this strong foundation, VNPT provides comprehensive integrated solutions: an &#8220;All-in-one&#8221; platform for SMEs to unify all operations within a single workplace, and the implementation of data integration layers (Data Lake, AI/BI) for large enterprises to consolidate, standardize, and intelligently leverage their data. </p>
<p>&nbsp;</p>
<h3><strong>3. Ransomware in Practice – Techniques and Lessons Learned from VNPT Cyber Immunity</strong></h3>
<p>&nbsp;</p>
<p><span class="discussion-level-1 discussion-id-26ce8e41-5bae-8010-897a-001cd0b6c3f7 notion-enable-hover" data-token-index="0">To provide a hands-on, practical perspective, Mr. Nguyen Doanh Thinh, a Security Analyst from VNPT Cyber Immunity, delved into today&#8217;s most pressing topic: Ransomware. </span><!-- notionvc: cf11c51e-8e27-494a-a795-05efd0aaf131 --></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996670" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-300x195.jpg" alt="" width="651" height="423" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-300x195.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-1024x666.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-768x499.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-1536x999.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3910-2048x1331.jpg 2048w" sizes="(max-width: 651px) 100vw, 651px" /></p>
<p>&nbsp;</p>
<p>A key highlight of the seminar was the discussion on how hackers infiltrate systems—from exploiting common web application vulnerabilities like Telerik, uploading a webshell, and privilege escalation, to deploying data-encrypting malware on a large scale. More importantly, the presentation summarized the core difficulties and limitations organizations often encounter during incident response. These include the lack of clear response procedures, authorization and legal issues, delays in detection and reaction, and especially, weaknesses in Backup and Disaster Recovery strategies. These are invaluable lessons for any organization.  </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996664" src="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-300x169.png" alt="" width="645" height="363" srcset="https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-300x169.png 300w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-1024x578.png 1024w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-768x433.png 768w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-1536x867.png 1536w, https://dibiz.vn/wp-content/uploads/2025/09/Screenshot-2025-09-12-at-4.13.24-pm-2048x1156.png 2048w" sizes="(max-width: 645px) 100vw, 645px" /></p>
<p>&nbsp;</p>
<h2><strong>Lively Interaction and Valuable Connections</strong></h2>
<p>&nbsp;</p>
<p>The concluding Q&amp;A session was exceptionally lively, with a series of insightful questions from attendees. This multi-faceted exchange between experts and participants not only clarified technical concerns but also painted a clear picture of the awareness and urgent need for cybersecurity in Vietnam. This vibrant atmosphere continued during the networking sessions, where conversations went beyond simple introductions and became the starting point for initial collaborative ideas.  </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996666" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-300x199.jpg" alt="" width="660" height="438" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-300x199.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-1024x678.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-768x509.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-1536x1017.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3872-2048x1356.jpg 2048w" sizes="(max-width: 660px) 100vw, 660px" /></p>
<p>&nbsp;</p>
<h2><strong>Conclusion</strong></h2>
<p>&nbsp;</p>
<p>The &#8220;Best Practices &amp; Solution Architecture toward Cyber Resilience&#8221; seminar concluded successfully, leaving attendees with valuable knowledge and profound insights. The event once again affirmed that in the relentless fight against cybercrime, thorough preparation, a solid system architecture, and close collaboration among technology partners are the keys to success. </p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-996672" src="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-300x197.jpg" alt="" width="653" height="429" srcset="https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-300x197.jpg 300w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-1024x672.jpg 1024w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-768x504.jpg 768w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-1536x1008.jpg 1536w, https://dibiz.vn/wp-content/uploads/2025/09/DAN_3878-2048x1343.jpg 2048w" sizes="(max-width: 653px) 100vw, 653px" /></p>
<p>&nbsp;</p>
<blockquote><p>To receive materials from the seminar or for a more in-depth consultation on the solutions offered by Commvault and VNPT, please contact: <strong><em>Ms. Ha</em> </strong>&#8211; Phone: 0326291803. Email: <a href="mailto:hatt@dibiz.vn">hatt@dibiz.vn</a> </p></blockquote>
<p>&nbsp;</p>
<p><!-- notionvc: 248196d4-b438-44bc-8b25-d4fffac98752 --></div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/seminar-on-cyber-resilience-building-a-proactive-and-sustainable-defense-strategy/">Seminar on Cyber Resilience: Building a Proactive and Sustainable Defense Strategy</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
