Data Protection

Data protection news, software and solutions, and analysis for IT professionals
  • White Paper

    Simplifying Data Protection

    Posted December 18, 2012 - 4:30 pm

    IT requires solutions that are not only simple to deploy, use and fit into their budgets, but most importantly ensure that systems are protected and met with the recovery time and points needed in the event of a disaster.
  • White Paper

    Are Employees Putting Your Company's Data at Risk?

    Posted December 18, 2012 - 4:30 pm

    Learn the challenges most organizations face today and tips about how to best ensure security of confidential data and information.
  • The best home backup plan options - Part 4: Cloud based backup

    Posted December 18, 2012 - 12:55 pm

    Cloud based backup is considered by many to be the backup method with the most advantages. As home internet connections have grown in bandwidth, this type of backup has become more accessible than ever before.
  • Another data-wiping malware program found in Iran

    Posted December 17, 2012 - 9:27 am

    A new piece of malware that deletes entire partitions and user files from infected computers has been found in Iran, according to an alert issued Sunday by Maher, Iran's Computer Emergency Response Team Coordination Center (CERTCC).
  • Egyptian hacker claims to find Yahoo vulnerabilities

    Posted December 16, 2012 - 11:26 pm

    A hacker in Egypt has released vague details of three vulnerabilities he claims to have found within Yahoo's website, the second time in two months he's found problems in the website of a major technology company.
  • The best home backup plan options - Part 3: External drive backup

    Posted December 13, 2012 - 9:17 am

    This is the third post in a series of posts describing a variety of home backup strategies and options. External drive backup has been the primary method used for proper backups for the past two decades.
  • US law enforcement busts cybercrime rings with help from Facebook

    Posted December 12, 2012 - 3:36 am

    U.S. law enforcement agencies with the help of Facebook have arrested 10 persons from various countries in connection with international cybercrime rings that targeted users on the social network.
  • Supply chain security moves to front burner in 2013

    Posted December 10, 2012 - 3:23 pm

    The onslaught of sophisticated cyber espionage against the U.S. and its allies has roused both lawmakers and private sector firms to tackle supply chain security.
  • Worst security snafus of 2012

    Posted December 10, 2012 - 2:47 pm

    The first half of 2012 was pretty bad -- from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches -- and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
  • The 3 biggest threats to your cloud data

    Posted December 10, 2012 - 1:50 pm

    Any horror movie fan can tell you the scariest threats are the ones you don't see coming, and the same is true when it comes to threats to cloud data. IT has decades of experience protecting on-premise resources. Virtually no one has even one decade of experience running major SaaS applications, so we should be prepared for some surprises.
  • Stupid users, or stupid infosec?

    Posted December 10, 2012 - 1:41 pm

    When security professionals see stupidity all around them, shouldn't they ask themselves whether it's their own precautions that are lacking?
  • Delta Air Lines publishes privacy policy, but reseacher finds a fault

    Posted December 9, 2012 - 7:45 pm

    Delta Air Lines quickly published a privacy policy for its mobile application on Friday after being sued by California's attorney general, but a privacy researcher has already found a fault with it and the app.
  • The best home backup plan options - Part 2: Same machine backup

    Posted December 8, 2012 - 8:00 am

    In part one of this series on creating a home backup plan I talked about the primary backup options you have available and the pros and cons to each. Over the next three parts, I'll detail how to use each of these methods and recommend some good options and tools.
  • The Weekly Hash - December 7, 2012

    Posted December 7, 2012 - 12:16 pm

    A silly review of recent tech stories, this week featuring the Gambino crime family, Yoko Ono and the pope
  • How to Backup Files On Your Computer - Part 1: The Basics

    Posted December 5, 2012 - 12:02 pm

    Nobody enjoys backing up their computers, but imagine the pain of losing every picture of your children, every vacation, graduation, birthday, and wedding. It usually takes getting burned once to be prodded into a backup strategy. Being prepared before that first disaster is a much saner option.
  • For midsize businesses, there is a new way to spell risk: BYOD

    Posted December 4, 2012 - 9:51 pm

    Online and offline, in IT departments and across organizations, the bring your own device (BYOD) debate is raging.
  • White Paper

    Peter the Great Versus Sun Tzu

    Posted December 4, 2012 - 7:00 pm

    Hackers exist in most countries of the world, but as we can clearly see from their campaigns, they each have their own way of operating. Experts from Trend Micro have published a paper in which they detail the differences between hackers
  • When in China, don't leave your laptop alone

    Posted December 4, 2012 - 4:48 pm

    If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them.
  • New 'Dockster' malware targets Apple computers

    Posted December 3, 2012 - 10:20 pm

    A new piece of malicious software targeted at Apple users has been found on a website dedicated to the Dalai Lama, but one security vendor is labeling it as low risk.
  • Instagram vulnerability on iPhone allows for account takeover

    Posted December 2, 2012 - 11:22 pm

    A security researcher published on Friday another attack on Facebook's Instagram photo-sharing service that could allow a hacker to seize control of a victim's account.
  • Japan space agency: virus may have stolen space rocket data

    Posted November 30, 2012 - 1:54 pm

    Japan's space agency said Friday that sensitive information on a new long-range rocket project may have been stolen by a computer virus.
  • Webcast

    Targeted Attacks: Don't be a Victim

    Posted November 29, 2012 - 2:15 pm

    Advanced Persistent Threats are on the rise. Organizations lose hundreds of thousands of dollars because traditional security just can't keep up. Effective security should be your eyes and ears throughout the network..
  • White Paper

    The Challenges of Securing a Virtual IT Infrastructure

    Posted November 29, 2012 - 2:15 pm

    Compelling new research by IDG Research Services spotlights the most pressing challenges facing organisations globally around virtualisation and security in data centers and clouds environments.
  • White Paper

    UC Berkeley Chooses Trend Micro Deep Security for Campus Security Services

    Posted November 29, 2012 - 2:15 pm

    Replacing end-of-life Cisco Security Agent simplifies security management and reduces the data center server security footprint.
  • White Paper

    Deep Discovery Uncovers Targeted Attacks Against Leading Hotel Chain

    Posted November 29, 2012 - 2:15 pm

    APTs are not welcome here. Leading hotel chain Motel 6 is fighting back against advanced persistent threats to protect credit card numbers and other private customer data.
Join us:






Data ProtectionWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question