Linux

Data security & protection News

  • August 19, 2016 19 Aug'16

    Built-in mobile security features put power in users' hands

    Recent advancements in mobile security technology allow smartphone vendors to offer more built-in features, such as the iris scanner in the new Samsung Galaxy Note7.

  • August 16, 2016 16 Aug'16

    Rubrik grabs $61 million, aims for cloud

    Converged data protection startup Rubrik turned to the cloud with a software release that allows customers to use Amazon AWS and Microsoft Azure as well as Rubrik's appliances to store data. Rubrik ...

  • August 10, 2016 10 Aug'16

    Book review: SpectraLogic's Society's Genome

    Written by SpectraLogic CEO Nathan Thompson with product specialist Bob Cone and software developer John Kranz, Society's Genome – Genetic diversity in digital preservation, makes a case for ...

  • August 09, 2016 09 Aug'16

    Bluetooth LE security hit with GATTack at Black Hat

    Amid varying attacks targeting IoT devices at Black Hat 2016, a new software proxy offered leverage against the latest Bluetooth LE security protections.

View All News

Data security & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data security & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Data security & protection

Learn to apply best practices and optimize your operations.

  • Implementing instant VM recovery and virtual test labs

    Thinking about instant virtual machine recovery for backup? Check out these three necessities when using the technology and learn how the process compares to a virtual test lab. Continue Reading

  • Cyberextortion: How should CISOs handle it?

    Organizations need to be aware of the threat of cyberextortion attacks and defend against them. Mike O. Villegas discusses the CISO's role in setting up the defense. Continue Reading

  • Digital governance and compliance tactics for the regulated business

    Digitization has become a fact life for businesses, but the increased data volumes and associated information security risks puts a strain on digital governance, risk and compliance (GRC) resources. Businesses have struggled as unprecedented data volumes in the digital age have made them particularly enticing -- and vulnerable -- to hackers. The big data explosion has also made it difficult for companies to adapt information governance processes to stay compliant with constantly evolving regulatory mandates. All is not lost, however: Predictive analytics and automation tools are evolving to help with GRC maintenance, while companies are also seeing the benefits of integrating risk management processes across company departments. In this SearchCompliance handbook, get advice on how to adapt your company's GRC budgeting and strategic processes to keep up with the speed of digital business. Continue Reading

View All Manage

Problem Solve Data security & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close