Opinion
Opinion
Data protection, backup and archiving
-
Security Think Tank: Adapting defences to evolving ransomware and cyber crime
The threat of identity theft via a data breach is heightened with the rise of attacks where ransomware threat actors both encrypt and ransom, and exfiltrate and leak their victims’ data. How does this evolution in cyber crime heighten risk for the ... Continue Reading
-
Security Think Tank: Securing containers needn’t be taxing
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for security teams. What do CISOs need to know to safeguard containers? Continue Reading
-
Security Think Tank: Container security is evolving, so must CISOs
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for security teams. What do CISOs need to know to safeguard containers? Continue Reading
-
Security Think Tank: Put information at the heart of security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Security Think Tank: Base cloud security posture on your data footprint
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Secure the cloud when negotiating contracts
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: In the cloud, the buck stops with you
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Is it true you can't manage what you don't measure?
What should be the key cyber security risk indicator for any business? Continue Reading
-
As data volumes grow, backup needs analytics, says StorageCraft CEO
Backup appliance maker’s CEO says backup needs analytics so customers can prioritise restore of critical data in a world where volumes increase by 50% a year Continue Reading
-
IT transformation brings storage transformation
IT departments’ moves away from specialised skills to generalist skillsets are fuelling the rise of easy-to-use hyper-converged infrastructure and all-flash storage systems Continue Reading
-
Is your storage ready for the future?
Research study looks at the challenge of building a storage infrastructure to meet the rapidly changing needs of business Continue Reading
-
Hybrid cloud storage: What data goes where?
Hybrid cloud storage keeps some data on-site while the rest goes to the cloud. But what data should go where in a hybrid cloud setup? Continue Reading
-
IT may not have to worry about mobile device backup
Analyst Charles Brett offers some advice for IT departments on backing up data from mobile devices, tablets and smartphones, Continue Reading
-
Array-based or vSphere Replication for VMware SRM?
What’s the best replication method for VMware Site Recovery Manager (SRM)? GlassHouse Technologies’ Paul Grimwood runs the rule over array-based replication and vSphere Replication Continue Reading
-
Is it time to move from data protection to information management?
Data can be the most valuable asset of a business, and most organisations take steps to protect it – but unfortunately with variable success Continue Reading
-
Nirvanix failure – a blow to the cloud storage model?
Cloud storage firm Nirvanix has given customers a deadline to retrieve their data. Are the reasons for its failure specific to Nirvanix or a real blow to cloud storage overall? Continue Reading
-
Four key questions in disaster recovery planning
The answers to four key questions will tell you if your organisation’s disaster recovery planning is up to the job Continue Reading
-
The data fragmentation challenge
Few organisations have policies to guide where data should and should not be stored. The result: data fragmentation Continue Reading
-
The challenges of information governance in our increasingly litigious age
Formulating the right enterprise-wide information governance policies is essential in heading off potential legal and compliance costs Continue Reading
-
How to manage big data and reap the benefits
IT security group Isaca examines the benefits of managing big data and offers seven tips for staying in control Continue Reading