Enterprise Data Storage

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IT in Europe, Security Edition: Data security cloud computing outlook

    Despite worries about data security, cloud computing is spreading over the UK enterprises, making heroes of many IT staff. 

  • The Craft of System Security

    In this Chapter 16 excerpt from, The Craft of System Security, authors Sean Smith and John Marchesini explain how an adversary can extract data from a device -- even after it has been 'erased.' 

  • More from SearchSecurity.com -- May 2007

    Online content from the May 2007 edition of Information Security magazine, examining best practices for the protection of sensitive information. 

  • Information Security Governance Guide

    This guide provides an introduction to what information security governance and a security program are, and examines how to deploy security policies within any environment. 

  • Business continuity planning standards and guidelines

    An excerpt from Chapter 1: Contingency and Continuity Planning of "Business Continuity and Disaster Recovery for InfoSec Managers," by John W. Rittinghouse and James F. Ransome. 

  • Steal this Computer Book 4.0: Prevent Google hacking

    Learn how to prevent Google hacking in this excerpt from Chapter 8: Stalking the Computer of "Steal this Computer Book 4.0," by Wallace Wang. 

  • Automating Network Compliance and Security

    In this excerpt from Chapter 2 of "The Shortcut Guide to Automating Network Management and Compliance," author Don Jones discusses how networks become non-compliant, and examines how automation can positively impact security and compliance business p... 

  • Man-in-the-middle attacks

    This excerpt from Chapter 2 of "Securing Storage: A Practical Guide to SAN and NAS Security" examines how man-in-the-middle attacks affect Fibre Channel security and examines how to determine if your organization is at risk. 

  • RSA Conference 2006

    Can't make it to RSA 2006? Check out our continuous coverage from the show floor. 

  • Serious Organized Crime Agency (SOCA)

    The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration. SOCA is based in the United Kingdom. (Continued...) 

  • The real reasons behind data backup disk failure

    Hugh Thompson, chief security strategist and founder of the consultancy People Security, tells a funny story about how one secretary's innocent mistake was the reason behind a series of suspicious 'media error' messages. 

  • Inside a retail hack

    Kevin Mandia of security consultancy Mandiant Corp. reviews an attack that is commonly used to swipe PIN numbers and compromise retailers: SQL injection. 

About Enterprise Data Storage

In this enterprise data storage resource guide, learn how to prevent data loss and information theft with several data storage solutions, encryption software and data management.