#memory-backup

[ follow ]
Information security
fromTNW | Insights
3 hours ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Psychology
fromSilicon Canals
9 hours ago

The people who always have a backup plan aren't pessimists. They grew up in environments where promises were unreliable, and redundancy became the only architecture that didn't collapse when someone changed their mind without warning. - Silicon Canals

Obsessive planners are often generous, driven by past experiences that teach them to prepare for uncertainties.
DevOps
fromInfoQ
21 hours ago

Replacing Database Sequences at Scale Without Breaking 100+ Services

Validating requirements can simplify complex problems, and embedding sequence generation reduces network calls, enhancing performance and reliability.
#data-breach
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Healthcare
fromTechCrunch
4 days ago

Health data giant CareCloud says hackers accessed patients' medical records | TechCrunch

CareCloud experienced a data breach where hackers accessed patient electronic health records for over eight hours, but data exfiltration status remains unclear.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Healthcare
fromTechCrunch
4 days ago

Health data giant CareCloud says hackers accessed patients' medical records | TechCrunch

CareCloud experienced a data breach where hackers accessed patient electronic health records for over eight hours, but data exfiltration status remains unclear.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
#oracle
fromTechzine Global
2 days ago
Tech industry

Oracle close to finalizing financing for Michigan data center

Oracle is finalizing $16 billion financing for a new Michigan data center to support AI applications, amid complex funding challenges.
fromTechzine Global
1 week ago
Information security

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
Tech industry
fromTechzine Global
2 days ago

Oracle close to finalizing financing for Michigan data center

Oracle is finalizing $16 billion financing for a new Michigan data center to support AI applications, amid complex funding challenges.
Information security
fromTechzine Global
1 week ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
Software development
fromTechzine Global
2 days ago

Microsoft rejiggers Intune to give patches time to prove themselves

Microsoft Intune will shift from pushing patches to measuring compliance with defined update standards, emphasizing policy and outcomes over delivery.
fromMedium
2 days ago

Snowflake Supports Directory Imports

With this feature, you can bring entire folders, ML models, dbt adapters, utilities, directly into UDxFs and Stored Procedures without zipping, file-by-file bookkeeping, or manual updates.
Django
#cloud-computing
European startups
fromTechzine Global
3 days ago

Dutch cloud providers join forces to create a sovereign alternative

Seven Dutch cloud providers are collaborating to enhance digital autonomy and counter American hyperscalers' dominance.
DevOps
fromInfoWorld
4 days ago

Enterprises demand cloud value

Businesses are shifting from cost-cutting to establishing centers of excellence and finops to enhance ROI in cloud investments.
DevOps
fromInfoWorld
1 week ago

Edge clouds and local data centers reshape IT

Cloud computing is evolving towards a selectively distributed model to address latency, sovereignty, and resilience in smart cities and AI applications.
Business
from24/7 Wall St.
4 days ago

SanDisk Gains 5%: 3 Reasons the Memory Supercycle Is Far From Over

SanDisk shares have surged 5% after a significant decline, reflecting investor confidence in the memory market's recovery and ongoing demand.
#data-integrity
fromComputerworld
4 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#ai
#cybersecurity
Information security
fromSecurityWeek
1 week ago

Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience

HP and Dell Technologies announced new security features to enhance hardware protections against physical attacks and quantum-computing threats.
Node JS
fromInfoQ
5 days ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Healthcare
fromSecurityWeek
5 days ago

Healthcare IT Platform CareCloud Probing Potential Data Breach

CareCloud experienced a cybersecurity incident that may have compromised patient information, but the impact is believed to be limited and manageable.
Information security
fromSecurityWeek
2 days ago

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Thirty-eight cybersecurity-related M&A deals were announced in March 2026, including significant acquisitions by Airbus, AppViewX, Cellebrite, and Databricks.
Information security
fromSecurityWeek
1 week ago

Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience

HP and Dell Technologies announced new security features to enhance hardware protections against physical attacks and quantum-computing threats.
fromComputerworld
22 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
East Bay (California)
fromSFGATE
1 week ago

Bay Area city remains paralyzed week after cyberattack

Foster City is experiencing a significant disruption due to a ransomware cyberattack, affecting communication and services for over a week.
fromTechzine Global
2 days ago

IGEL OS can now run AI models locally on endpoints

AI Armor provides dynamic runtime security and relies on a central policy engine in the Universal Management Suite (UMS) to meet compliance requirements, ensuring that organizations can manage their security effectively.
DevOps
Information security
fromSecurityWeek
1 day ago

Critical ShareFile Flaws Lead to Unauthenticated RCE

Two critical vulnerabilities in ShareFile could allow unauthenticated remote code execution through improper access to configuration pages.
DevOps
fromComputerWeekly.com
2 days ago

Arm works with IBM to deliver flexibility on mainframe | Computer Weekly

IBM and Arm are collaborating to create dual-architecture hardware for enterprise AI and data-intensive workloads.
Remote teams
fromNextgov.com
2 weeks ago

Consolidation in a complex and aging enterprise IT environment

Federal agencies must pursue strategic IT consolidation to manage aging legacy systems while modernizing, requiring strong leadership, disciplined planning, and change management beyond technological decisions.
Digital life
fromWIRED
3 weeks ago

I Set Up My Own NAS Server, and It Was Surprisingly Easy

Setting up a personal NAS server provides private, automated backups and centralized file storage without relying on third-party cloud services or big tech platforms.
European startups
fromTechzine Global
1 week ago

NetApp in the age of AI: balancing sovereignty and cloud

Data sovereignty is reshaping enterprise technology strategies, particularly in Europe, as organizations prioritize control, accessibility, and compliance in their infrastructure.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Web development
fromTheregister
2 weeks ago

Brilliant backups landed web developer in big trouble

A website migration oversight caused a two-year disconnect where office staff viewed outdated content due to hardcoded DNS settings, while the client only discovered the issue when accessing the site from the office.
fromTechzine Global
4 days ago

IGEL introduces reference architectures for secure cloud desktops

"For healthcare, government, and contact center environments, reducing risk at the endpoint is essential. By aligning IGEL's immutable endpoint OS and Adaptive Secure Desktop™ with Windows 365 and Microsoft Azure Virtual Desktop, these reference architectures give organizations clear guidance for delivering secured and resilient digital workspaces."
DevOps
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Business intelligence
fromEntrepreneur
3 weeks ago

The Game-Changing Tech Saving Companies From Data Disasters

Combining Continuous Data Protection with AI capabilities enables businesses to achieve near-zero Recovery Point Objectives and minimal Recovery Time Objectives, preventing data loss and minimizing downtime.
#cloud-storage
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Gadgets
fromZDNET
4 weeks ago

How I used CloneZilla to fully back up my PC in case disaster strikes (and it's free)

System imaging backs up your entire computer including the operating system, settings, apps, and accounts, allowing complete restoration to a new machine without reconfiguration.
Artificial intelligence
fromwww.theguardian.com
3 weeks ago

Datacenters are becoming a target in warfare for the first time

Iran deliberately targeted commercial datacenters in the Persian Gulf, marking the first known instance of a country at war striking commercial datacenters, causing widespread service disruptions across the UAE and Bahrain.
fromZDNET
1 month ago

Why encrypted backups may fail in an AI-driven ransomware era

What if I told you that everything you know and everything you do to ensure quality backups is no longer viable? In fact, what if I told you that in an era of generative AI, when it comes to backups, we're all pretty much screwed?
Miscellaneous
fromTheregister
1 month ago

When protecting your data meant punching a hole in it

The presence of a notch made the floppy write-protected, so you started with a write-enabled floppy, and if you wanted to protect it, you punched a notch at just the right spot.
Typography
DevOps
fromInfoWorld
5 days ago

How to build an enterprise-grade MCP registry

MCP registries are essential for integrating AI agents with enterprise systems, requiring semantic discovery, governance, and developer-friendly controls.
Science
fromTheregister
1 month ago

Storage for a virtual eternity, but we're not there yet

Microsoft's Project Silica uses femtosecond lasers to store 2TB of data in glass plates, offering a potentially permanent solution to digital preservation compared to fragile magnetic tape storage.
fromTheregister
3 weeks ago

Bug that wiped customer data saved the day - and a contract

I looked at the config and noticed the customer did not have a default route set. He wasn't sure if that was the problem, so he made some changes he thought might be useful. The router Caleb worked on then rebooted, which he expected. But when it restarted, its previous configuration was gone.
Tech industry
DevOps
fromInfoWorld
1 week ago

Rethinking VM data protection in cloud-native environments

KubeVirt enables Kubernetes to manage both VMs and containers, requiring new strategies for VM lifecycle management and data protection.
fromTheregister
1 month ago

Server crashes traced to one very literal knee-jerk reaction

It was the time of Novell networks, RG58 cables, and bulky tower PCs. It was also a time before the telemarketer's IT department employed specialists. Carter and his two colleagues - boss Mike and part-time student Stefan - therefore handled tasks ranging from programming to support, and everything in between.
Software development
Information security
fromTechRepublic
3 days ago

Google Drive Expands AI Ransomware Detection, File Recovery to More Users

Google Drive now features AI-powered ransomware detection and built-in file recovery, significantly improving threat identification and response capabilities.
#data-protection
DevOps
fromTechzine Global
1 week ago

DataCore Introduces Swarm Appliance for Edge Data Protection

DataCore's Swarm Appliance offers a comprehensive data protection solution for edge and ROBO environments, combining immutability, encryption, and malware detection.
Information security
fromTechzine Global
2 weeks ago

Rubrik adds Google Workspace backup with air-gapped protection

Rubrik launched Data Protection for Google Workspace with air-gapped backups, rapid recovery capabilities, and identity resilience protection across Gmail, Google Drive, and Okta environments.
DevOps
fromTechzine Global
1 week ago

DataCore Introduces Swarm Appliance for Edge Data Protection

DataCore's Swarm Appliance offers a comprehensive data protection solution for edge and ROBO environments, combining immutability, encryption, and malware detection.
Information security
fromTechzine Global
2 weeks ago

Rubrik adds Google Workspace backup with air-gapped protection

Rubrik launched Data Protection for Google Workspace with air-gapped backups, rapid recovery capabilities, and identity resilience protection across Gmail, Google Drive, and Okta environments.
Information security
fromComputerWeekly.com
4 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromInfoQ
4 days ago

Cloudflare Adds Active API Vulnerability Scanning to Its Edge

Cloudflare's Web and API Vulnerability Scanner focuses on detecting Broken Object Level Authorization vulnerabilities in APIs.
Information security
fromSecurityWeek
5 days ago

Exploitation of Fresh Citrix NetScaler Vulnerability Begins

Exploitation of a critical Citrix NetScaler vulnerability began shortly after its public disclosure, with active attempts detected within days.
fromTechzine Global
2 weeks ago

NetApp launches EF50 and EF80 for AI and HPC workloads

As businesses contend with ever-increasing data volumes and performance-intensive applications such as AI model training, AI inferencing and high-performance computing, they need infrastructure that delivers speed, scalability and efficiency without added complexity.
DevOps
Tech industry
fromUnited States Edition
1 month ago

Spotlight report: Accelerating Data Center Modernization

Data center modernization is critical for AI deployment, requiring integrated infrastructure solutions across servers, storage, networking, and security.
DevOps
fromInfoWorld
2 weeks ago

Cloud-based LLMs risk enterprise stability

Enterprises must return to architectural resilience principles when adopting cloud-hosted LLMs to mitigate risks from increasingly common outages that cause widespread business disruption.
DevOps
fromInfoWorld
2 weeks ago

Update your databases now to avoid data debt

Multiple major open source databases reach end-of-life in 2026, requiring teams to plan upgrades and migrations to avoid security risks and higher costs.
DevOps
fromComputerWeekly.com
2 weeks ago

Everpure's Evergreen One for AI brings Exa flash and GPU-based service-level agreements | Computer Weekly

Everpure launches Evergreen One for AI, a consumption model with GPU-count-based SLAs for FlashBlade//Exa storage to optimize AI workload performance.
Science
fromComputerworld
1 month ago

Data stored in glass could last over 10,000 years, Microsoft says

Borosilicate glass plates can store multi-terabyte data with femtosecond laser encoding and survive accelerated aging indicating potential 10,000-year retention as a durable archival medium.
DevOps
fromTechzine Global
3 weeks ago

Everpure brings ActiveCluster to file environments

Everpure expands its Enterprise Data Cloud platform with ActiveCluster for file environments, enabling seamless data movement between systems while maintaining availability and protecting unstructured data critical for AI applications.
fromTechzine Global
1 month ago

Microsoft Silica stores data for 10,000 years in special kitchen glass

Microsoft has achieved a breakthrough with Project Silica. The technology for long-term data storage now works with borosilicate glass. This is the same material used for cookware and oven doors. The method can store data for up to 10,000 years. Long-term storage of digital information remains a challenge for data centers and archives. Magnetic tapes and hard drives degrade within a few decades, making them less suitable for storing data for future generations.
Science
US politics
fromFortune
2 months ago

Inside the race to build data centers | Fortune

Mega-scale AI data centers are driving AI growth, transforming landscapes, straining energy and water resources, and creating major political and economic conflicts.
fromDbmaestro
4 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
Information security
fromComputerWeekly.com
2 weeks ago

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

Integration layers between security platforms, not the platforms themselves, have become the primary enterprise security risk requiring rigorous governance of delegated trust.
#windows-backup
fromZDNET
1 month ago
Digital life

Your Windows PC has a secretly useful backup tool - here's how to access it

fromZDNET
1 month ago
Digital life

Your Windows PC has a secretly useful backup tool - here's how to access it

Information security
fromTechzine Global
3 weeks ago

Veeam Patches Critical Vulnerabilities in Backup & Replication

Veeam resolved four critical vulnerabilities in Backup & Replication that enable remote code execution on backup servers, with patches available in versions 12.3.2.4465 and 13.0.1.2067.
Artificial intelligence
fromTechzine Global
1 month ago

IBM FlashSystem: 'Autonomous AI takes over 90% of storage management'

IBM's FlashSystem 5600/7600/9600 integrate agentic AI to autonomously manage storage, reducing management effort up to 90% while optimizing performance, security, and costs.
Information security
fromThe Hacker News
3 weeks ago

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Veeam released security updates addressing seven critical vulnerabilities in Backup & Replication software that enable remote code execution and privilege escalation if exploited.
Information security
fromComputerworld
3 weeks ago

Storage vendor offers a real guarantee - but check out those fine-print exceptions

Tech vendors frequently offer performance guarantees with substantial financial penalties, but hidden exceptions in EULAs often make claims difficult or impossible to collect.
Artificial intelligence
fromThe Verge
2 months ago

Ugreen is now selling an AI NAS with more RAM than my desktop

Integrated AI tools enable intuitive natural-language file search, on-device chat, automated image categorization, audio transcription, and automatic file organization for instant retrieval.
Information security
fromThe Hacker News
3 weeks ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromTechRepublic
3 weeks ago

Veeam's 'Agent Commander': Bringing Guardrails and Resilience to the Wild West of AI

Data resilience emerges as enterprises adopt AI and autonomous agents, requiring integrated backup, security, and AI governance solutions to enable safe production deployment.
fromTechRepublic
1 month ago

What Are the Pros and Cons of Data Centers?

When ChatGPT launched in late 2022, I watched something remarkable happen. Within two months, it hit 100 million users, a growth rate that sent shockwaves through Silicon Valley. Today, it has over 800 million weekly active users. That launch sparked an explosion in AI development that has fundamentally changed how we build and operate the infrastructure powering our digital world.
Artificial intelligence
fromTechzine Global
2 months ago

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal solution that can withstand any change. However, such a solution does not exist. Nevertheless, future-proofing is an important concept for IT leaders navigating continuous technological developments and security risks, all while ensuring that daily business operations continue. The challenge is finding a balance between reactive problem solving and proactive planning, because overlooking a change can cost your organization. So, how do you successfully prepare for the future without that one-size-fits-all solution?
Tech industry
Information security
fromTechzine Global
2 months ago

Acronis launches Archival Storage for long-term data protection

Acronis Archival Storage provides MSPs S3-compatible, compliant, cost-predictable long-term object storage integrated with Acronis Cyber Protect Cloud.
fromTechzine Global
2 months ago

Dell PowerStore 4.3 supports 30TB QLC drives and enhanced cybersecurity

The new version combines lower costs with improved cybersecurity and offers up to 2 petabytes of storage in a 2U rack space. Companies are struggling with explosive data growth, increasing cyber threats, and limited budgets. Dell Technologies is responding to this with PowerStore 4.3, a platform that addresses storage challenges without compromising performance or security. The latest version brings innovations that double storage density and reduce energy costs.
Information security
Information security
fromEntrepreneur
2 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
Information security
fromTechzine Global
2 months ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
Information security
fromTheregister
2 months ago

Techie's one ring brought darkness by shorting a server

A technician wearing a wedding ring shorted a server board, causing an outage, briefly concealed the failure, and service resumed after an unexpected reboot.
Information security
fromBusiness Matters
2 months ago

Understanding the Safety of the Cloud: How Threat Protection Strengthens Your Business

Cloud safety requires continuous, coordinated threat protection that detects suspicious activity early to protect data, maintain productivity, and enable scalable operations.
Information security
fromSecurityWeek
1 month ago

Organizations Urged to Replace Discontinued Edge Devices

End-of-support edge devices create major security risks and must be identified and replaced promptly to prevent exploitation by state-sponsored threat actors.
[ Load more ]