Data Protection

Data protection news, software and solutions, and analysis for IT professionals
  • Webcast

    Preventing Data Breaches with Data Access Governance

    Posted August 29, 2014 - 11:47 am

    Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
  • White Paper

    How Access Governance Makes Data Loss Prevention Successful

    Posted August 29, 2014 - 11:47 am

    Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework and appropriately evaluate and manage risk.
  • Webcast

    See what Security, Reliability and Efficiency looks like

    Posted August 29, 2014 - 11:47 am

    The new System x servers with Intel ® Xeon ® processors offer innovative technology, offer innovative technology with exclusive new advanced security features to provide enterprise class data protection.
  • White Paper

    10 Best Practices for Integrating Data

    Posted August 29, 2014 - 11:46 am

    Data integration is often underestimated and poorly implemented, taking time and resources. Yet it continues to grow in strategic importance as customer data and touch points grow with the emergence of cloud, social and mobile technologies.
  • CryptoWall held over half-a-million computers hostage, encrypted 5 billion files

    Posted August 29, 2014 - 8:24 am

    A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.
  • Question

    Fixing distorted image thumbnails

    Posted August 29, 2014 - 2:16 am

    can anyone tell me about fixing damaged Thumbnails? I have recovered the images using a JPG repair software but still i cannot extract the original thumbnails?
  • Security council blames breaches on poor PCI standard support

    Posted August 28, 2014 - 2:18 pm

    The growing number of data breaches resulting in massive numbers of payment cards being stolen from retail stores and other businesses is occurring because they're failing to keep up with the Payment Card Industry's data security standard, according to the PCI Security Standards Council.
  • Mozilla reports user data leak from Bugzilla project

    Posted August 28, 2014 - 8:38 am

    Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
  • Retailers urged to defend against 'Backoff' point-of-sale malware

    Posted August 28, 2014 - 2:00 am

    A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.
  • White Paper

    Secure by Design

    Posted August 27, 2014 - 9:16 pm

    This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
  • White Paper

    Case Study: VCE Converged Infrastructure Enables Continuous Operation for Swiss Power Plant

    Posted August 27, 2014 - 9:15 pm

    Read how Vblock™ Systems, running in active-active mode, enabled KKL to transform its twin data centers in just two months, enable continuous operations, virtualize 95% of its applications and reduce servers by 50%.
  • Netcore, Netis routers have hardcoded password, Trend Micro says

    Posted August 26, 2014 - 2:25 am

    A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
  • White Paper

    Infographic: Breached - How Your Data Can Be Put at Risk

    Posted August 25, 2014 - 8:00 pm

    Breaches like the Target breach of 2013 and the recent "Heartbleed" bug are not just an electronic problem. Get up-to-speed on common types of physical and electronic data breaches with this infographic.
  • Webcast

    Business-driven Data Protection

    Posted August 23, 2014 - 12:15 am

    Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the Arcserve team will offer insights and solutions to make data protection a strategic component of your business.
  • US warns 'significant number' of major businesses hit by Backoff malware

    Posted August 22, 2014 - 5:04 pm

    Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
  • Turn, cough and verify your identity [CARTOON]

    Posted August 22, 2014 - 6:00 am

    In the wake of recent security breaches of medical databases, doctors can’t be too careful
  • Should companies practice data retention or data destruction?

    Posted August 21, 2014 - 2:42 pm

    Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
  • US agencies to release cyberthreat information faster to the health-care industry

    Posted August 21, 2014 - 2:02 pm

    U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.
  • Webcast

    Data Breaches - Don't Be a Headline

    Posted August 21, 2014 - 1:16 pm

    Whether it's a HIPAA/HITECH, Sarbanes Oxley, Gramm-Leach-Bliley violation, or a State breach notification law, a data breach can have substantial legal and financial consequences, regardless of industry.
  • The UPS Store says malware found on systems of 51 stores

    Posted August 20, 2014 - 8:00 pm

    The UPS Store said Wednesday that malicious software was found on the systems of 51 of its franchises in 24 U.S. states, although no fraud has been detected yet.
  • Webcast

    PST Archiving: Your Employees' Dirty Little Secret

    Posted August 20, 2014 - 3:01 pm

    Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10 software can help efficiently and effectively manage it in this short video.
  • White Paper

    2014 Healthcare Data Management Survey Summary

    Posted August 20, 2014 - 12:15 pm

    This report provides insights into how much information Healthcare IT organizations are managing, the rate of data growth they are experiencing and which applications and business needs are driving that growth.
  • White Paper

    5 Strategies for Modern Data Protection

    Posted August 20, 2014 - 12:15 pm

    Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you're poised to meet future demands.
  • A basic encryption strategy for storing sensitive data

    Posted August 20, 2014 - 11:45 am

    A rule to live by with sensitive data is that at some point, your server will be compromised. With that in mind, it’s a good idea to protect your data, and more importantly your customer’s data, from a server breach.
  • Why would Chinese hackers want hospital patient data?

    Posted August 18, 2014 - 8:06 pm

    The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.
Join us:






Data ProtectionWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question