Disk Security Reports

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

TechTarget ComputerWeekly.com

CW Nordics February 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: In this first issue of CW Nordics in 2017, we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists.
Posted: 08 Feb 2021 | Published: 23 Feb 2017

TechTarget ComputerWeekly.com

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Presentation Transcript: Changing the Rules of Backup: Go Beyond Virtual Tape Library for Accelerating Your Backup
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: FalconStor Software provides solutions that can dramatically improve backup speeds while working with your current backup technology and operations. Management can be streamlined even while performance improves.
Posted: 27 May 2009 | Published: 14 May 2009

FalconStor Software

Top Considerations for Implementing Secure Backup and Recovery
sponsored by Zmanda Inc.
WHITE PAPER: Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data.
Posted: 09 Jul 2008 | Published: 08 Jul 2008

Zmanda Inc.

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

StorageConsole® Backup Manager 6.5 - What's New
sponsored by APTARE
DATA SHEET: APTARE StorageConsole for Backup Manager provides detailed reporting for HP Data Protector 5.5 and 6.0.
Posted: 16 Apr 2008 | Published: 01 Jul 2007

APTARE

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
sponsored by Symantec Corporation
BOOK: This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
Posted: 01 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation