<
>

Posts in Data Protection

IBM Study: C-Suite Leaders Who Value Trust in Data are Positioned to Outperform Peers

IBM's 20th edition of its bi-annual C-Suite Study, "Build Your Trust Advantage," polled nearly 13,500 C-level executives across the globe to examine how companies are achieving market...

Do you remember when a few minutes of downtime was ok?

The IT infrastructure that we use to support business today is changing beyond recognition from what it was a few short years ago. Self-contained, on-premise or hosted data centres that were...

Zerto Advances Its Cloud Backup and Extends Continuous Data Protection Platform with AWS Storage File Gateway

Zerto, an industry leader for IT resilience, announced support for AWS Storage File Gateway for cloud backup and long-term retention (maintenance) storage in the cloud. The move furthers...

GDPR Compliance Rate Remains Low According to New Talend Research

It was reported that 58% of businesses worldwide that was surveyed failed to meet the requests of individuals upon obtaining a copy of their personal data as required by GDPR (General Data Protection...

Veritas Tested and Validated for AWS Outposts

Veritas Technologies, a worldwide market share leader in enterprise data protection and software-defined storage, announced that it has the capabilities to support AWS Outposts. AWS Outposts are...

Powering up Businesses with ERP Systems

Authored by: Peter Lees, Chief Technologist, SUSE Asia Pacific & Japan In a world in which organisations are becoming more digitally driven and transforming like never before, the...

C-Level Forum : Profiling Cybercriminals To Protect Your Data Privacy Event Summary E-book

Cybersecurity Asean (CSA) ran an event focusing on the strategies in profiling cybercriminals and protecting the organisation's data privacy in collaboration with...

Is Veritas Getting Its Groove Back?

At the Veritas Vision Executive Forum, we heard one interesting comment from Chris Lin, Veritas Senior Vice President of Sales for APJ, who said that being a technology house, Veritas is good at...

CSA, IBM and CyberSecurity Malaysia Event Report – Profiling the Psychology of Cybercriminals to Improve Your Data Privacy

Cybersecurityasean.com teamed up with IBM and Cybersecurity Malaysia to run an exciting event that coupled the idea of profiling the psychology of cybercriminals with how companies’ priorities...

Endpoint Remediation Explained

Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT...

Pages

Subscribe to RSS - Data Protection