Sitemap - 2023 - Data Protection Gumbo

227: Why Simple Backups Don't Cut It Anymore - Scality

226: Tape Storage in 2024: Why You Need to Hear This Now - Tape Ark

225: Cutting Through Alerts by Optimizing Your Security Operations Center - Silk Security

224: How Generative AI is Changing the Security Questionnaire Game – Vendict

223: Ransomware Resilience: Proven Strategies to Render It Powerless – Calamu

222: Ransom Paid: Now, How Do We Catch Cyber Criminals? – Panther Protocol

221: Your Data, Your Rules: Exploring Self-Sovereign Identities - Verida

220: The Pitfalls of Cybersecurity Incident Response - Sygnia

219: The Rise of Virtual CISO Neighborhood Watch - Health-ISAC

218: Breaking Down the Hype of Airgap and Immutable Backups - Mr. Backup

217: Unmasking the Risks of Your Data Storage - Hostirian

216: How Ransomware Changed the Cybersecurity Landscape - Recorded Future

215: From Chaos to Compliance: Solving the compliance headaches of Microsoft 365 - Hornetsecurity

214: Ransomware's New Adversary: The Power of Identity Orchestration - Strata Identity

213: Restore Speed: Business Maker or Breaker? - Pure Storage

212: Unveiling the True ROI of Legacy vs. Cloud-Native - Emma

211: How to Protect Your Backups from Cyberattacks - Alcion

210: Where Squid Games, AI, and Data Protection Merge - Lenovo

209: SaaS Protection Pitfalls: What Existing Solutions Are Missing - Eoghan Casey

208: Navigating the CISO Post-Breach Landscape - Colm Keegan

207: Cloud Commandments: Backup, Recovery, and Security – Storagepipe / Thrive

206: Bridging the On-Prem and Cloud Storage Gap – Cloudian

205: Plumbing the Depths of Unstructured Data - Superna

204: Ransomware, Resiliency, and Recovery: The Triple R's of Data Security - Quorum

203: Data Security's Power Couple: Backup and Metadata - GRAU DATA

202: Object Storage vs. Tape Backup: The Ultimate Showdown - OSNEXUS

201: Preserving Privacy in a World of AI – 4FreedomMobile

199: Backup-as-a-Service: The Unstoppable Ascend - The Futurum Group

198: Unraveling Kubernetes and Data Protection: Rethinking Data Management – TLA Tech B.V.

197: Cyber Resilience: Breach, Recover, Improve - acsense

196: The Chef's Special: Insights from the RSA Conference - Veritas

195: The AI and Cloud Revolution in Data Protection - DCIG

194: Why Are “Secure” Companies Still Being Hacked? - Mamori

193: Mastering the Cloud with Zero Trust Architecture – Netsurit

192: Redefining Cloud Storage: A Deep Dive into Decentralization – Filebase

192: Redefining Cloud Storage: A Deep Dive into Decentralization - Filebase

191: Data and Resilience in the AI Age - Arcitecta

190: The Impact of Third-Party Cybersecurity Risk on Business Continuity - VISO Trust

189: From Data Chaos to Data Maturity - McKnight Consulting Group

188: Navigating Tech Layoffs by Taking Control of Your Career - Career Rehab

187: Mitigating Cybersecurity Vulnerabilities Through Network Automation - BackBox

186: Why Compliance is Not Security - CyberSecurity Specialist

184: Exploring Microsoft 365 Backup and Recovery - Alcion

183: Closing the SaaS Backup Disconnect - Enterprise Strategy Group

182: Ransomware Recovery: Checking Your Data - Index Engines

181: Navigating the Cloud: Strategies for Improving Your Security Posture - Solvo

180: The Ins and Outs of ZFS and BtrFS Technology - Inspeere

179: How to Air Gap Your Backups the Right Way - EtherGap

178: Why it’s Critical to Backup Your Atlassian Jira Data - Revyz | Markforged

177: The Collision of Backup, Recovery, and Security - Cohesity

176: The Evolution of Data Storage: From Disks to Tapes to Objects in the Cloud - OSNEXUS/Seagate Lyve Cloud

175: How to Secure Your Smartphone in 2023 - Efani