Check out our companion blog!
The Backup Wrap-up

The Backup Wrap-up

The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware.

Recent Episodes

Stop Using VSS as a Backup Before Ransomware Deletes Your Shadow Copies
April 27, 2026

Stop Using VSS as a Backup Before Ransomware Deletes Your Shadow Copies

Stop Using VSS as a Backup Before Ransomware Deletes Your Shadow Copies Ransomware deletes shadow copies using your own built-in Windows tools against you — and if VSS was your backup plan, you just found out the hard way tha...
Ransomware Sanctions, OFAC, and the Lazarus Group: A Real Case Study
April 20, 2026

Ransomware Sanctions, OFAC, and the Lazarus Group: A Real Case Study

Ransomware sanctions are something most companies never think about — until they're staring down a ransom demand from a group the US government has already put on a sanctions list. In this episode, Dr. Mike Saylor walks us th...
The Real Cost of a Ransomware Attack: The Ransom Is the Least of Your Problems
April 13, 2026

The Real Cost of a Ransomware Attack: The Ransom Is the Least of Your Problems

The cost of a ransomware attack goes way beyond the ransom itself — and most organizations don't find that out until it's too late. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and co-host Prasanna Ma...
How Polymorphic Malware Evades Detection — And What to Do About It
April 6, 2026

How Polymorphic Malware Evades Detection — And What to Do About It

Polymorphic malware is the kind of threat that changes its own code — its signature, its behavior, even the command-and-control server it reports to — specifically so your antivirus can't catch it. In this episode, Dr. Mike S...
Emergency Episode: The PyPI Software Supply Chain Attack You Need to Know About
March 26, 2026

Emergency Episode: The PyPI Software Supply Chain Attack You Need to Know About

A PyPI software supply chain attack hit LiteLLM — a library pulled into developer environments 97 million times a month — and if you use it, you may already be compromised. This wasn't a fake package or a typo-squatting trick...
Fileless Malware: The Attack That Lives in Memory
March 23, 2026

Fileless Malware: The Attack That Lives in Memory

Fileless malware is one of the most dangerous attack types out there — it never writes to your hard drive, lives entirely in RAM, and can steal your credentials before your antivirus has any idea it's there. In this episode, ...

Reviews

Glad this podcast exists!

"I’m very glad that there is a backup focused podcast. I am a backup and recovery administrator and it’s really nice to find a source of information I can learn from. Not only is this podcast informat…"

andymerritt | Dec. 20, 2022

Insightful and entertaining

"They are shedding light on a very crucial part of business that doesn’t seem to get enough attention. Cyber attacks are only ramping up more, and backup is only going to become more important.Plus …"

thEbéstcustömer | Sept. 25, 2023

Outstanding Content!

"Curtis and Prasanna do a great job every week discussing the real life experiences of an area in Technology Operations that most people won’t find sexy, but need to take care of every day!They brin…"

Jrochlin | April 1, 2020