Email Alerts
-
Archives and data protection: The important differences
While the two are both equally important, it's vital that you don't confuse archiving with data protection. Marc Staimer explains their differences. Tip
-
Week 44: Permissions, part 2 -- Who owns what when?
Attackers can gain access to your system through files, directories and devices with higher privileges than necessary that execute on behalf of a privileged task. Tip
-
Week 43: Permissions -- How world-writeable are you?
Files, directories and devices that can be modified by any user are known as "world–writable" and are dangerous security holes. Tip
-
Best practices for writing an information classification policy
When developing your organization's information classification policy, there are three best practices that you should keep in mind. Tip
-
Finding storage space for outer space
HP helps to ensure if E.T. does phone, the data is captured. Tip
-
Newspaper breaks news on rugged storage systems
The Atlanta Journal-Constitution chose SANnet storage systems because they could withstand disturbances from nearby presses. Tip
-
Verify your data
Tip
Security Management Strategies for the CIO