#backup-solutions

[ follow ]
#data-protection
Information security
fromTechzine Global
1 month ago

Rubrik adds Google Workspace backup with air-gapped protection

Rubrik launched Data Protection for Google Workspace with air-gapped backups, rapid recovery capabilities, and identity resilience protection across Gmail, Google Drive, and Okta environments.
fromSecuritymagazine
1 day ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
#remote-work
Remote teams
fromFast Company
15 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
15 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
15 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
15 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
15 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
15 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
#cloud-computing
fromInfoQ
1 day ago
DevOps

When a Cloud Region Fails: Rethinking High Availability in a Geopolitically Unstable World

DevOps
fromInfoQ
1 day ago

When a Cloud Region Fails: Rethinking High Availability in a Geopolitically Unstable World

Cloud regions are influenced by geopolitical events, necessitating multi-region strategies for resilience against disruptions.
European startups
fromTechzine Global
2 days ago

The European cloud of the future is built using actual, physical containers

Cloud workloads increasingly utilize physical containers through initiatives like the Modular Integrated Sustainable Datacenter (MISD) project.
DevOps
fromInfoWorld
6 days ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
DevOps
fromInfoWorld
3 weeks ago

Enterprises demand cloud value

Businesses are shifting from cost-cutting to establishing centers of excellence and finops to enhance ROI in cloud investments.
#digital-sovereignty
European startups
fromZDNET
16 hours ago

98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere

SUSE is focusing on digital sovereignty to enhance choice and resilience in enterprise IT globally.
DevOps
fromTechzine Global
1 day ago

Red Hat OpenShift takes sovereign step to Google Cloud Dedicated

Red Hat OpenShift on Google Cloud Dedicated supports regulated sectors with isolated infrastructure for digital sovereignty, available in the second half of 2026.
European startups
fromZDNET
16 hours ago

98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere

SUSE is focusing on digital sovereignty to enhance choice and resilience in enterprise IT globally.
DevOps
fromTechzine Global
1 day ago

Red Hat OpenShift takes sovereign step to Google Cloud Dedicated

Red Hat OpenShift on Google Cloud Dedicated supports regulated sectors with isolated infrastructure for digital sovereignty, available in the second half of 2026.
London startup
fromBusiness Matters
2 days ago

Software Subscriptions Are Draining SME Budgets - But There Is an Alternative

British SMEs face rising costs and should scrutinize software subscriptions, particularly accounting software, which significantly impacts cash flow.
fromInfoQ
1 day ago

How to Build an Exchange: Sub Millisecond Response Times and 24/7 Uptimes in the Cloud

Exchanges are a place where you can submit an order to buy something, letting everyone know about the price you want and notifying you when your order gets filled. They serve as financial infrastructure, providing up-to-date prices and facilitating trades.
Cryptocurrency
Digital life
fromThe New Yorker
1 day ago

The Anguish of Data Loss

Data preservation is crucial, yet digital devices are fragile and often treated carelessly, leading to significant loss when data is not backed up.
#privacy
Privacy professionals
fromSecuritymagazine
2 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
6 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromSecuritymagazine
2 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
6 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
#ransomware
Healthcare
fromNextgov.com
2 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Healthcare
fromSecuritymagazine
1 week ago

What "The Pitt" Gets Right About Ransomware and What Hospitals Can't Afford to Ignore

Ransomware incidents in healthcare lead to significant operational fallout, requiring extensive recovery efforts beyond just paying the ransom.
Information security
fromSecuritymagazine
2 weeks ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Healthcare
fromNextgov.com
2 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Healthcare
fromSecuritymagazine
1 week ago

What "The Pitt" Gets Right About Ransomware and What Hospitals Can't Afford to Ignore

Ransomware incidents in healthcare lead to significant operational fallout, requiring extensive recovery efforts beyond just paying the ransom.
Information security
fromSecuritymagazine
2 weeks ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Tech industry
fromTheregister
3 days ago

HP's remote desktop push retreats as Anyware heads for EoL

HP is discontinuing its Teradici-derived remote desktop business, including HP Anyware and zero client hardware, by May 2026.
Information security
fromIT Brew
9 hours ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
#cybersecurity
fromTechCrunch
6 days ago
Information security

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

DevOps
fromTheregister
18 hours ago

Hybrid clouds have two attack surfaces - so watch both

Hybrid cloud management tools present significant security vulnerabilities that users often overlook.
Information security
fromTheregister
20 hours ago

Sharing isn't caring if it's an admin password: Pwned

Prioritizing convenience over security can lead to significant data loss, as demonstrated by a client using a common password and sharing it publicly.
DevOps
fromSecuritymagazine
2 days ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromTechCrunch
6 days ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
EU data protection
fromSecurityWeek
6 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Artificial intelligence
fromTearsheet
2 days ago

Why the back office comes first in AI deployments and failures that keep reappearing - Tearsheet

67% of banks and credit unions are implementing AI, but only 16% have a coherent strategy for it.
Information security
fromSecurityWeek
20 hours ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
fromComputerWeekly.com
1 day ago

Blackbox replaces two racks of HPE storage with 8U of Everpure | Computer Weekly

Blackbox Hosting has consolidated storage from two full racks down to just 8U of rack space following migration to Everpure FlashArray hardware, achieving a 10:1 data reduction ratio and an 85% reduction in power utilization.
DevOps
European startups
fromTechzine Global
3 days ago

Cisco Sovereign Critical Infrastructure now available in Europe

Cisco launches Sovereign Critical Infrastructure across EMEA, enabling organizations to innovate while maintaining control over their data and infrastructure.
World news
fromTheregister
2 weeks ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
Artificial intelligence
fromTechRepublic
6 days ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
#oracle
Information security
fromSecurityWeek
1 day ago

Oracle Patches 450 Vulnerabilities With April 2026 CPU

Oracle released 481 new security patches in April 2026, addressing vulnerabilities across 28 product families, with many remotely exploitable without authentication.
Information security
fromTechzine Global
1 month ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
DevOps
fromComputerWeekly.com
3 days ago

Storage implications of a modern IT architecture | Computer Weekly

Organizations are increasingly using containers to modernize applications and manage both cloud-native and traditional workloads with Kubernetes.
DevOps
fromTechzine Global
3 days ago

SUSE seeks to make VMware migrations a "non-event"

SUSE partners with Cloudbase to integrate Coriolis for seamless migration of virtual machines from VMware and public clouds.
EU data protection
fromTNW | Offers
4 weeks ago

Automate ISO 27001, SOC 2, & DORA compliance from 2,999/year

Compliance is essential, but traditional methods are inefficient; automation can significantly reduce workload and improve effectiveness.
Information security
fromSecurityWeek
2 days ago

Unsecured Perforce Servers Expose Sensitive Data From Major Orgs

Many internet-facing Perforce P4 servers are misconfigured, exposing sensitive information and allowing unauthorized access.
DevOps
fromwww.bankingdive.com
4 days ago

How proactive DEX strengthens IT compliance in financial services

Proactive DEX management helps financial services organizations address compliance challenges by continuously monitoring and improving the digital workplace.
Information security
fromSecurityWeek
2 days ago

Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster

Progress Software released patches for multiple vulnerabilities in MOVEit WAF and LoadMaster that could lead to remote code execution and command injection.
fromInfoQ
4 days ago

Engineering Stable, Secure and Scalable Platforms: A Conversation with Matthew Liste

I was always a tinkerer, I guess. I grew up in the age where computers were not ubiquitous or common. An experience as a kid was instrumental in how my career happened.
DevOps
fromSecurityWeek
3 days ago

Bluesky Disrupted by Sophisticated DDoS Attack

The attack is impacting our application, with users experiencing intermittent interruptions in service for their feeds, notifications, threads and search.
Information security
DevOps
fromBusiness Matters
1 week ago

The Role of Dedicated Servers in Scaling Modern Businesses

Infrastructure investment is crucial for SMEs to ensure reliability, performance, and user experience in a competitive digital landscape.
Privacy professionals
fromMedCity News
1 month ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Business intelligence
fromEntrepreneur
1 month ago

The Game-Changing Tech Saving Companies From Data Disasters

Combining Continuous Data Protection with AI capabilities enables businesses to achieve near-zero Recovery Point Objectives and minimal Recovery Time Objectives, preventing data loss and minimizing downtime.
fromTechzine Global
1 week ago

Commvault launches AI tools for secure agentic AI era

"In agentic environments, agents mutate state across data, systems, and configurations in ways that compound fast and are hard to trace," says Pranay Ahlawat, Chief Technology and AI Officer at Commvault.
Information security
fromZDNET
1 month ago

Why encrypted backups may fail in an AI-driven ransomware era

What if I told you that everything you know and everything you do to ensure quality backups is no longer viable? In fact, what if I told you that in an era of generative AI, when it comes to backups, we're all pretty much screwed?
Miscellaneous
Artificial intelligence
fromTheregister
1 month ago

Perplexity: Everything is Computer

Perplexity launches Computer for Enterprise, an AI orchestration service that automates business tasks across integrated cloud applications like Gmail, Slack, and Salesforce.
fromTheregister
1 month ago

Server crashes traced to one very literal knee-jerk reaction

It was the time of Novell networks, RG58 cables, and bulky tower PCs. It was also a time before the telemarketer's IT department employed specialists. Carter and his two colleagues - boss Mike and part-time student Stefan - therefore handled tasks ranging from programming to support, and everything in between.
Software development
fromTheregister
1 month ago

Bug that wiped customer data saved the day - and a contract

I looked at the config and noticed the customer did not have a default route set. He wasn't sure if that was the problem, so he made some changes he thought might be useful. The router Caleb worked on then rebooted, which he expected. But when it restarted, its previous configuration was gone.
Tech industry
Information security
fromSecurityWeek
2 weeks ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
DevOps
fromInfoWorld
4 weeks ago

Rethinking VM data protection in cloud-native environments

KubeVirt enables Kubernetes to manage both VMs and containers, requiring new strategies for VM lifecycle management and data protection.
fromComputerWeekly.com
1 month ago

Weighing up the enterprise risks of neocloud providers | Computer Weekly

Neocloud providers, which include the likes of Nscale, CoreWeave and Carbon3.ai, are having a somewhat disruptive impact on the market by making huge commitments to build out hyperscale datacentres in support of the UK government's AI growth agenda. These providers are also taking up capacity in colocation datacentres that some of the hyperscale cloud giants previously committed to renting space in, before pulling out.
Miscellaneous
Digital life
fromZDNET
2 months ago

Your Windows PC has a secretly useful backup tool - here's how to access it

Windows includes a hidden built-in Backup tool that can back up files and system images to discs, drives, or network locations but is deprecated.
Tech industry
fromUnited States Edition
1 month ago

Spotlight report: Accelerating Data Center Modernization

Data center modernization is critical for AI deployment, requiring integrated infrastructure solutions across servers, storage, networking, and security.
fromTechzine Global
2 months ago

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal solution that can withstand any change. However, such a solution does not exist. Nevertheless, future-proofing is an important concept for IT leaders navigating continuous technological developments and security risks, all while ensuring that daily business operations continue. The challenge is finding a balance between reactive problem solving and proactive planning, because overlooking a change can cost your organization. So, how do you successfully prepare for the future without that one-size-fits-all solution?
Tech industry
Tech industry
fromInfoWorld
2 months ago

Why cloud outages are becoming normal

Recurrent cloud outages disrupt enterprise operations worldwide, driven by misconfigurations, neglected resilience, rising complexity, and staffing challenges.
fromTechRepublic
2 months ago

What Are the Pros and Cons of Data Centers?

When ChatGPT launched in late 2022, I watched something remarkable happen. Within two months, it hit 100 million users, a growth rate that sent shockwaves through Silicon Valley. Today, it has over 800 million weekly active users. That launch sparked an explosion in AI development that has fundamentally changed how we build and operate the infrastructure powering our digital world.
Artificial intelligence
Tech industry
fromEntrepreneur
2 months ago

Store 1TB of Company Files for Just $60

OnlineDrive provides 1TB lifetime cloud storage with enterprise-grade security, resumable uploads, regional servers, team workspaces, and S3 infrastructure for $59.99.
Artificial intelligence
fromEntrepreneur
2 months ago

The Quiet AI Threat Can Damage Your Company Without Warning

Corrupted training data undermines AI effectiveness, causing poor decisions, wasted resources, loss of trust, and erosion of competitive advantage.
DevOps
fromTechzine Global
1 month ago

Everpure brings ActiveCluster to file environments

Everpure expands its Enterprise Data Cloud platform with ActiveCluster for file environments, enabling seamless data movement between systems while maintaining availability and protecting unstructured data critical for AI applications.
DevOps
fromComputerWeekly.com
1 month ago

Strong security balances consolidation and best-of-breed capabilities | Computer Weekly

Security platformisation delivers genuine value through native data correlation across integrated telemetry sources, not just operational efficiency from consolidation.
Information security
fromComputerWeekly.com
1 month ago

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

Integration layers between security platforms, not the platforms themselves, have become the primary enterprise security risk requiring rigorous governance of delegated trust.
Information security
fromTechzine Global
1 month ago

Veeam Patches Critical Vulnerabilities in Backup & Replication

Veeam resolved four critical vulnerabilities in Backup & Replication that enable remote code execution on backup servers, with patches available in versions 12.3.2.4465 and 13.0.1.2067.
Information security
fromComputerworld
1 month ago

Storage vendor offers a real guarantee - but check out those fine-print exceptions

Tech vendors frequently offer performance guarantees with substantial financial penalties, but hidden exceptions in EULAs often make claims difficult or impossible to collect.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromTechRepublic
1 month ago

Veeam's 'Agent Commander': Bringing Guardrails and Resilience to the Wild West of AI

Data resilience emerges as enterprises adopt AI and autonomous agents, requiring integrated backup, security, and AI governance solutions to enable safe production deployment.
Information security
fromEntrepreneur
2 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
Information security
fromSecurityWeek
2 months ago

Organizations Urged to Replace Discontinued Edge Devices

End-of-support edge devices create major security risks and must be identified and replaced promptly to prevent exploitation by state-sponsored threat actors.
fromBusiness Matters
2 months ago

What Happens to Business Technology When It Reaches End of Life?

Most businesses, which includes modern ones, invest heavily in technology, but they rarely plan for its eventual and inevitable exit strategy. Generally speaking, companies spend millions on the latest hardware while overlooking the critical phase when those assets reach their end. This lack of planning creates a massive gap in the operational lifecycle of many otherwise successful global organizations. Decisions made at the end of a device's life carry real business risks that can impact the bottom line financially and environmentally speaking.
Information security
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromSecuritymagazine
2 months ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
[ Load more ]