ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
EGUIDE:
In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
EGUIDE:
This e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.
EGUIDE:
In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
EGUIDE:
VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
EGUIDE:
This e-guide details how one engineering firm slashed its budget for data storage, backup and replication from hundreds of thousands of dollars per year to hundreds of dollars per month by balancing their on-site resources and cloud services. Learn how a combination of Amazon Web Services and an on-site caching appliance made this all possible.
EGUIDE:
In this expert guide, explore how to track down and identify data storage bottlenecks and performance-robbing configuration issues in virtual environments. Also discover what tools to use to solve these bottlenecks and how to match apps to specific storage environments.
EGUIDE:
In this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.