Data Protection

RSS
Data protection news, software and solutions, and analysis for IT professionals
  • As Windows gets safer, old vulnerabilities still have bite

    Posted November 8, 2012 - 8:49 pm

    Microsoft Windows is safer- and harder to exploit than ever before. Despite the improvements in OS security, however, security experts tell ITworld that it's the old wounds that hurt the most, as organizations continue to fall to cyber attacks that exploit vulnerabilities discovered - and patched - years earlier. Why?
  • What you should know about Microsoft's new BitLocker Management

    Posted November 8, 2012 - 4:27 pm

    Encryption can be a bit of a double-edged sword for organizations. It is an effective and essential tool for protecting sensitive data, but it often comes with a healthy side of user confusion and help desk calls. Microsoft hopes to simplify the process of implementing and managing BitLocker data encryption with the launch of Microsoft BitLocker Administration and Management (MBAM) 2.0 Beta 2.
  • US election could mean movement on high-skill immigration, copyright

    Posted November 7, 2012 - 3:06 pm

    Tuesday's election in the U.S. leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
  • Anonymous-backed demonstration unfolds outside U.K. Parliament

    Posted November 5, 2012 - 6:03 pm

    Members and followers of the Anonymous hacking group demonstrated outside the British Parliament in London Monday, following a series of hacking attacks to protest, among other things, the incarceration or confinement of alleged hackers and various proposals for monitoring communications.
  • Security through obscurity: How to cover your tracks online

    Posted November 5, 2012 - 4:26 pm

    From Tor to steganography, these six techniques will help obscure the data and traces you leave online
  • E-voting systems only as reliable as the paper trail they produce

    Posted November 5, 2012 - 12:59 pm

    Electronic voting machines introduce many problems and, without accompanying paper records, are not as reliable as paper ballots
  • Smart meters not so clever about privacy, researchers find

    Posted November 5, 2012 - 12:46 pm

    Researchers at the University of South Carolina have discovered that some types of electricity meter are broadcasting unencrypted information that, with the right software, would enable eavesdroppers to determine whether you're at home.
  • White Paper

    Security Best Practices for File-based Data Movement - an IT Practitioner's Guide

    Posted November 5, 2012 - 12:45 pm

    Data security for file-based data movement is finally getting the attention it deserves. What was once a concern only in the financial services sector is now being treated seriously by all industries.
  • Firefox to force secure connections for selected domains

    Posted November 2, 2012 - 9:17 am

    Mozilla introduced a pre-loaded list of domains for Firefox that only can be connected to securely in order to help protect the privacy and security of users.
  • White Paper

    LWG Consulting Takes Business Continuity to the Next Level

    Posted October 31, 2012 - 11:45 am

  • Four commands to spook a sysadmin

    Posted October 30, 2012 - 11:41 am

    Wanna give a good Halloween scare to that special system or database administrator in your life? Try mentioning one of these commands
  • Irked by cyberspying, Georgia outs Russia-based hacker -- with photos

    Posted October 30, 2012 - 7:44 am

    In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
  • Breach prevention is dead. Long live the 'secure breach'

    Posted October 29, 2012 - 5:41 pm

    Every defense paradigm has a finite life span and the IT industry's breach prevention paradigm, which is based on perimeter technology designed to keep the bad guys out, is completely out of step with today's threat landscape. It's time to move on to a new era: the "secure breach" era.
  • Barnes & Noble halts use of PIN pad devices after data breach

    Posted October 24, 2012 - 9:43 pm

    Barnes & Noble has removed PIN pad devices from all of its nearly 700 stores nationwide as a precaution after detecting evidence of tampering with the devices at 63 of its stores in eight states.
  • White Paper

    Performance Analytics: How Normal is Your Data

    Posted October 24, 2012 - 12:30 am

    This VMware paper takes a technical look at a variety of IT performance data (operating system metrics, quality-of-service metrics, business performance metrics, etc.) to determine how well these metrics can be modeled as "normally distributed." This concept is at the heart of VMware vCenter Operations' performance analytics capability, and provides a deeper insight into how the technology helps adapt and learn typical IT behaviors to then provide automated policies that keep alerts and outages in check.
  • White Paper

    Disaster Recovery Exercises Fall Short of the Finish Line

    Posted October 23, 2012 - 7:30 pm

    Though many enterprises have advanced disaster recovery technologies put in place, they still fall short when it comes to actual preparedness due to a lack of formal processes and a strict regimen for exercising DR plans. This report details 10 tips for updating and improving your current DR exercise program to help you meet expected recovery objectives when faced with an unexpected event.
  • White Paper

    Fact Sheet: Webroot Intelligent Network

    Posted October 23, 2012 - 5:00 pm

    Webroot Intelligent Network (WIN) integrates billions of pieces of information from multiple sources to create the world's largest malware detection net. Get the facts on how WIN is different from other cloud-based anti-virus solutions.
  • 12 industry disaster scenarios

    Posted October 20, 2012 - 7:25 am

    The end of the world may or may not be nigh, but in the tech industry, many of these possibilities could easily become reality
  • Webcast

    Extend the Virtual Edge of the Data Center to the Branch

    Posted October 10, 2012 - 5:30 pm

  • White Paper

    File Sharing: Risk or Remedy?

    Posted October 9, 2012 - 4:30 pm

    Despite the need for effective document collaboration in the enterprise, many organizations are failing to provide their employees with the right tools to get the job done. Today's knowledge worker wants platform-agnostic, on-demand access to their files whenever and wherever they need them... and they'll bring this functionality into the organization whether IT approves of it or not. As a result, end-users are driving the adoption of cloud-based file sharing solutions such as Dropbox and Box, while corporate IT departments tend to dismiss these tools due to security concerns - both perceived and real.
  • Question

    How to monitor an employee desktop?

    Posted October 9, 2012 - 8:58 am

    I suspect some of my employees do not give their best performance, and access confidential company data and treat it without care. What can I do to monitor their activity on their PC or laptop without their knowledge?
  • Question

    How to Removed an Outlook Duplicates Items From Outlook 2007?

    Posted October 8, 2012 - 9:18 am

    My Outlook's pst file is so large and have some duplicate items too so i want to search and Delete permanently Duplicate Items .please give me some suggestion what to do for this.
  • White Paper

    Rapidly Recover Our Virtual Environment

    Posted October 4, 2012 - 1:30 pm

    Thinking about disaster recovery for a virtualized infrastructure? This e-book describes factors to consider when ensuring virtualization availability. And key criteria to look for in a solution that efficiently manages backup and recovery operations across your virtual and physical infrastructure.
  • White Paper

    Q & A: Decoding Deduplication

    Posted October 4, 2012 - 1:30 pm

    Have questions about what exactly Data Deduplication does for your business? This Q & A addresses a few commonly asked questions about Data Deduplication. How does it work? What problems does it best address? How easy is it to use and implement? Find answers and get objective advice here.
  • White Paper

    Guide: Data Deduplication Done Right

    Posted October 4, 2012 - 1:30 pm

    Deduplication can save you time and money when backing up your company's data. Discover how it works, how it fits into your existing data infrastructure and how it assists in disaster recovery. Plus, take a look at some of the market-leading products available for your business.

Data ProtectionWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question
randomness