Sitemap - 2023 - Data Protection Gumbo
227: Why Simple Backups Don't Cut It Anymore - Scality
226: Tape Storage in 2024: Why You Need to Hear This Now - Tape Ark
225: Cutting Through Alerts by Optimizing Your Security Operations Center - Silk Security
224: How Generative AI is Changing the Security Questionnaire Game – Vendict
223: Ransomware Resilience: Proven Strategies to Render It Powerless – Calamu
222: Ransom Paid: Now, How Do We Catch Cyber Criminals? – Panther Protocol
221: Your Data, Your Rules: Exploring Self-Sovereign Identities - Verida
220: The Pitfalls of Cybersecurity Incident Response - Sygnia
219: The Rise of Virtual CISO Neighborhood Watch - Health-ISAC
218: Breaking Down the Hype of Airgap and Immutable Backups - Mr. Backup
217: Unmasking the Risks of Your Data Storage - Hostirian
216: How Ransomware Changed the Cybersecurity Landscape - Recorded Future
215: From Chaos to Compliance: Solving the compliance headaches of Microsoft 365 - Hornetsecurity
214: Ransomware's New Adversary: The Power of Identity Orchestration - Strata Identity
213: Restore Speed: Business Maker or Breaker? - Pure Storage
212: Unveiling the True ROI of Legacy vs. Cloud-Native - Emma
211: How to Protect Your Backups from Cyberattacks - Alcion
210: Where Squid Games, AI, and Data Protection Merge - Lenovo
209: SaaS Protection Pitfalls: What Existing Solutions Are Missing - Eoghan Casey
208: Navigating the CISO Post-Breach Landscape - Colm Keegan
207: Cloud Commandments: Backup, Recovery, and Security – Storagepipe / Thrive
206: Bridging the On-Prem and Cloud Storage Gap – Cloudian
205: Plumbing the Depths of Unstructured Data - Superna
204: Ransomware, Resiliency, and Recovery: The Triple R's of Data Security - Quorum
203: Data Security's Power Couple: Backup and Metadata - GRAU DATA
202: Object Storage vs. Tape Backup: The Ultimate Showdown - OSNEXUS
201: Preserving Privacy in a World of AI – 4FreedomMobile
199: Backup-as-a-Service: The Unstoppable Ascend - The Futurum Group
198: Unraveling Kubernetes and Data Protection: Rethinking Data Management – TLA Tech B.V.
197: Cyber Resilience: Breach, Recover, Improve - acsense
196: The Chef's Special: Insights from the RSA Conference - Veritas
195: The AI and Cloud Revolution in Data Protection - DCIG
194: Why Are “Secure” Companies Still Being Hacked? - Mamori
193: Mastering the Cloud with Zero Trust Architecture – Netsurit
192: Redefining Cloud Storage: A Deep Dive into Decentralization – Filebase
192: Redefining Cloud Storage: A Deep Dive into Decentralization - Filebase
191: Data and Resilience in the AI Age - Arcitecta
190: The Impact of Third-Party Cybersecurity Risk on Business Continuity - VISO Trust
189: From Data Chaos to Data Maturity - McKnight Consulting Group
188: Navigating Tech Layoffs by Taking Control of Your Career - Career Rehab
187: Mitigating Cybersecurity Vulnerabilities Through Network Automation - BackBox
186: Why Compliance is Not Security - CyberSecurity Specialist
184: Exploring Microsoft 365 Backup and Recovery - Alcion
183: Closing the SaaS Backup Disconnect - Enterprise Strategy Group
182: Ransomware Recovery: Checking Your Data - Index Engines
181: Navigating the Cloud: Strategies for Improving Your Security Posture - Solvo
180: The Ins and Outs of ZFS and BtrFS Technology - Inspeere
179: How to Air Gap Your Backups the Right Way - EtherGap
178: Why it’s Critical to Backup Your Atlassian Jira Data - Revyz | Markforged
177: The Collision of Backup, Recovery, and Security - Cohesity