Email Alerts
-
How to stop hacker theft: Employee awareness, risk assessment policies
In the first of a six-part primer on thinking like a hacker, security managers are encouraged to examine publicly available information and discarded data. Tip
-
The Kingdom of Impervious: Episode I -- Protecting the infrastructure
Take a lighter look at the security world and enjoy the adventures of noblepersons (security gurus) defending their kingdoms (company networks) from evildoers (crackers). Tip
-
Week 3: Restore a backup tape and recover usable data
It's important to regularly test your back-ups. Tip
-
Keeping the Alligators Out of the Sewer
This excerpt is from The Backup Book: Disaster Recovery from Desktop to Data Center, written by Dorian J. Cougias and published by Schaser-Vartan Books Tip
-
The five A's of functional SAN security
Keeping a SAN secure is complex because SANs are complex. Tip
-
Best principles for storage security
From a business perspective, storage security should be evaluated as any other technology. Tip
-
Consolidation helps unify management company's backups
Consolidation helps unify management company's backups Tip
-
Physically secure your backups
Help in preventing theft of data or identity. Tip
-
Failover scheme, installboot and disk to disk copy
Here's a poor man's failover scheme Tip
-
Automated backups are 'on the money' for financial services firm
Automated backups are 'on the money' for Cramer Rosenthal McGlynn, LLC. Tip
Security Management Strategies for the CIO