Redazione RHC : 10 September 2025 07:31
Cyberstorage: Italian IT managers’ response to increasingly sophisticated ransomware. The landscape has changed in recent years: more aggressive ransomware, data exfiltration before encryption, service interruptions due to physical events and more. In this context, simply “saving” data is no longer enough: storage becomes part of security. Precisely for this reason, Italian IT managers are increasingly focusing on cyberstorage: storage designed to resist attacks directly where the data resides.
At its core is a key architectural principle: the fragmentation and native distribution of data across multiple geographic locations. This is complemented by integrated security features—such as immutability, encryption, and access control—that increase resilience and support true business continuity even in critical scenarios.
To put it simply: it’s storage with built-in security. Not a layer applied on top, but native data-level controls to resist tampering, deletion, encryption, and unauthorized access.
Historically, we’ve relied on perimeter controls (firewalls, network segmentation), identity management, and versioning. These tools are useful, but not sufficient when the attacker reaches the storage itself. Cyberstorage was created to fill this gap: it brings zero trust down to the data level, reducing the likelihood of total compromise and facilitating recovery.
It’s no coincidence that Gartner analysts list cyberstorage among the 6 strategic IT trends of 2025: fragmenting, distributing, and protecting data across multiple locations minimizes the risk of data compromise and breach.
Today’s ransomware gangs are no longer limited to encrypting data. In many cases, the attack begins with exfiltration: data is copied and taken out of the organization, then encrypted to make it inaccessible, and finally used as leverage to threaten its publication.
This is known as double or triple extortion, an approach that renders even a perfectly functioning backup useless, because the real damage is not just service interruption, but loss of confidentiality.
This exposes the company to:
At the same time, attacks targeting virtualization infrastructures and backup repositories are increasing. On the physical level, the risks of disaster (fires, floods) and prolonged interruptions (blackouts) remain.
Cyberstorage isn’t a magic solution, but it represents a key component of a modern disaster recovery plan, which focuses on data integrity and confidentiality even in extreme conditions.
“Traditional” storage was created for capacity, performance, and availability. Cyberstorage adds:
These elements operate on the data itself, not just at the network perimeter.
With the entry into force of the NIS2 directive, Italian organizations—both public and private—must demonstrate their ability to guarantee business continuity, data security, and the availability of essential services even in the event of an attack. Having a backup is no longer enough: regulations require concrete evidence of effective technical and organizational measures, as also established by the GDPR. A poor strategy exposes the company to high risks: prolonged disruptions, financial damage, and fines of up to €10 million or 2% of annual global revenue, whichever is higher.
The goal is not to overturn the stack, but to increase resilience with concrete and measurable choices. Here are the basics:
Guiding questions to guide priorities:
The ability to recover is crucial, but so is preventing loss/exfiltration before encryption. A modern disaster recovery plan must include attack-resistant storage, strict access controls, role segregation, and systems designed for security by design.
When evaluating a cyberstorage solution, it’s not enough to look at cost and performance: resilience comes from architectural choices and security features. Below are the most relevant technical criteria to consider.
In a context where cyberattacks are increasingly sophisticated, Cubbit offers a concrete response. Unlike the traditional cloud, Cubit encrypts, fragments, and replicates data across multiple geographic locations—safe from ransomware and disasters. We’re talking about 100% Italian cloud storage, chosen by Leonardo, Rai Way, and more than 400 Italian and European companies.
In addition to immutability and native geo-redundancy, Cubbit stands out for its transparent approach: no hidden costs, savings of up to 80% compared to hyperscalers, data localization in Italy, and compliance with regulations such as GDPR, ACN, and NIS2.
Compatible with the S3 standard, it easily integrates with Veeam and other clients already in use. The scalable architecture allows you to quickly scale from TB to PB. The technology is available in two modes, depending on your operational needs:
You can start with DS3 Cloud (ready-to-use cloud object storage) or create your own customized cloud with DS3 Composer (a fully European software-defined solution).
Activate a free Cubbit trial or contact the team directly on the official website.