Data Protection

Data protection news, software and solutions, and analysis for IT professionals
  • White Paper

    Ensuring High Availability of Your Active Directory Forest

    Posted January 28, 2013 - 11:45 am

    Are you prepared for an Active Directory forest failure? Read this white paper to learn what you need to know to be able to recover from the failure of an AD domain, or entire forest, quickly and completely.
  • White Paper

    Defeating Advanced Persistent Threat Malware

    Posted January 25, 2013 - 2:15 pm

    Malware is everywhere. Existing approaches to neutralizing viruses, worms, and Trojan horse viruses -- anti-virus software, web filters, etc., are not effective against sophisticated Advanced Persistent Threat (APT) Malware
  • Twitter ordered to identify racist tweeters in France

    Posted January 24, 2013 - 9:42 pm

    A French court has ordered Twitter to hand over any data that could help authorities there identify people who posted racist and anti-Semitic tweets on its website.
  • White Paper

    Understand and Defend Against Risk

    Posted January 23, 2013 - 3:45 pm

    Today's IT infrastructure is open to more threats and vulnerabilities from increasingly sophisticated attackers. This eBook covers best practice tips on implementing and maintaining security to defend your business.
  • White Paper

    Security for a Faster World

    Posted January 23, 2013 - 3:45 pm

    Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that's evolving faster than ever before. Read this dossier to find out more.
  • Reporters Without Borders website abused in malware campaign

    Posted January 22, 2013 - 10:29 pm

    The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
  • White Paper

    Practical Advice for Streamlining Business Continuity and Disaster Recovery Solutions

    Posted January 22, 2013 - 4:15 pm

    This paper provides practical advice for maintaining a functional DR strategy, and for streamlining business continuity solutions.
  • Explaining the Kim Dotcom/Megaupload case

    Posted January 22, 2013 - 1:04 pm

    Confused about all the fuss around Kim Dotcom and Megaupload? Wondering what it’s all about? Let us explain it so even mom will understand
  • Google sees one password ring to rule them all

    Posted January 18, 2013 - 10:04 pm

    Google thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form of a piece of jewelry such as a ring.
  • Webcast

    Top 5 Considerations For Selecting Backup And Recovery Tools

    Posted January 18, 2013 - 6:00 pm

    Watch a webcast to learn about the most critical functionalities you need in a backup and recovery solution, including VMware and Windows server backup support. Watch webcast.
  • White Paper

    Analyst Advice On Protecting Virtual And Physical Servers

    Posted January 18, 2013 - 6:00 pm

    Check out a new analyst report to see how you can back up and recover your virtual and physical environments with one low-cost, easy-to-use solution. Read the report!
  • The Weekly Hash - January 18, 2013

    Posted January 18, 2013 - 11:48 am

    A semi-serious look back at some of the top tech stories of the week, today featuring Lance Armstrong’s surprising confession to Oprah, a guy outsourcing his own job to China and the Mexican Army getting hacked
  • Malware masquerades as patch for Java

    Posted January 17, 2013 - 9:22 pm

    Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers.
  • Expected EU data breach rules draw fire before their release

    Posted January 17, 2013 - 1:10 pm

    European Commission proposals for a strategy on cybercrime have come under fire before they have even been released.
  • White Paper

    Insider Fraud: New Ponemon Survey Reveals All Organizations Have Risk

    Posted January 16, 2013 - 1:45 pm

    Hacks, accidental disclosures and breaches appear in the news every week. This new survey shows the next victim could easily be you. Understand your risk-get this essential information now.
  • White Paper

    Simplify Your Audits and Compliance Efforts

    Posted January 16, 2013 - 1:45 pm

    Managing compliance is a challenge. Learn how to apply this 3-step process to capture activity on your critical systems, analyze data in real-time, query historical records at the press of a button, and simplify your audits.
  • Forrester survey tries to pinpoint hardest-working CISOs across the world

    Posted January 15, 2013 - 9:55 pm

    Do chief information security officers (CISOs) in North America work harder than their security counterparts in Europe?
  • Swartz suicide shines light on federal anti-hacking law

    Posted January 15, 2013 - 12:18 pm

    The suicide of Internet activist and pioneer Aaron Swartz has focused attention on what some activists say is the overzealous use of the federal Computer Fraud and Abuse Act anti-hacking statute.
  • EMC offers online file sharing with on-premise storage product

    Posted January 15, 2013 - 11:46 am

    EMC is building on its acquisition of the Syncplicity file-sharing and collaboration service by combining it with its Isilon scale-out NAS to provide the enterprise what the storage giant claims provides the convenience of a cloud-based file-sharing service with the administrative and governance capabilities of an on-premise solution.
  • Diplomatic and government agencies targeted in years-long cyberespionage operation

    Posted January 14, 2013 - 2:51 pm

    Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. The operation involved the use of highly customized and sophisticated data theft malware, researchers from antivirus firm Kaspersky Lab said Monday.
  • Microsoft to release emergency Internet Explorer patch on Monday

    Posted January 13, 2013 - 11:48 pm

    Microsoft will release a patch on Monday for older versions of its Internet Explorer browser, deviating from its normal repair schedule due to the seriousness of the problem.
  • Oracle patches latest zero-day vulnerabilities in Java

    Posted January 13, 2013 - 8:47 pm

    Oracle released two out-of-band patches on Sunday for vulnerabilities in its Java programming language, both of which pose a high risk to users browsing the web.
  • Wiretapping law's renewal dismays rights groups

    Posted January 13, 2013 - 8:28 am

    A last-minute move by the U.S. Senate to renew a controversial wiretapping law, days before it was set to expire on Dec. 31, has dismayed privacy advocates, rights groups and lawmakers who have long opposed the measure.
  • White Paper

    Managing File Transfer and Improving Compliance

    Posted January 11, 2013 - 1:30 pm

    Implementing robust, scalable, and dependable file transfer solutions is difficult. The addition of compliant to that list of features increases the cost of implementing custom solutions.
  • When to call for help after a data breach

    Posted January 10, 2013 - 10:03 pm

    In spite of best practices, it is likely your organization will experience a serious data breach at some point. Once the initial shock wears off you'll be faced with numerous decisions, the most significant of which is whether to seek help from outside professionals such as attorneys, computer forensics investigators, information security consultants, privacy consultants and law enforcement.
Join us:






Data ProtectionWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question