The Ultimate Guide to Data Protection
2024 edition
Overview
Data is the lifeblood of many organisations, which is why protecting it at all costs is so important.
Not only is data protection essential from a business operational sense, but legally many laws say data must be protected as well.
Data Protection is a term often used in a legal context (such as the General Data Protection Regulation) and involves the security, privacy, availability, and integrity of data.
Companies should engage in the concept of data protection by mitigating cyber risk and utilising strategies to keep their data safe and secure.
Analyst reports
Gartner on Cloud Security
Australia's information security spending forecast to e...
Today
IDC on Data management
NetApp rolls out new capabilities to boost users' Gen A...
This month
IDC MarketScape on Firewall
Sophos named Leader in midsize business security by IDC
Last month
Gartner on BI
Data Privacy Day: Vectra AI emphasises a proactive appr...
Fri, 26th Jan 2024
Gartner on Storage
Scality promotes Marie-Laure Retureau as VP of Sales fo...
Thu, 18th Jan 2024
Expert columns
By George Moawad of Genetec
Ensuring security without compromising privacy
Yesterday
By Petar Bielovich of Atturra
Factors to consider before undertaking an AI deployment
Last week
By Vera Huang of IQ-EQ
Why culture is emerging as a game-changer in the privat...
This month
By Tim Davoren of Logicalis Australia
Customer-centric cybersecurity incident response vital ...
Last month
By Michal Lewy Harush of Aqua Security
How the cloud security landscape will evolve in 2024
Last month
More expert columns
By Siroui Mushegian of Barracuda Networks
The data loss that will hurt your business the most
Mon, 29th Jan 2024
By Keith Payne of Nintex
Five ways to improve risk management through effective ...
Thu, 25th Jan 2024
By Martin Creighan of Commvault
Data storage and security trends propelling Australian ...
Tue, 23rd Jan 2024
By Shane Buckley of Gigamon
Why 2024 will be the year of scaling security efficienc...
Mon, 15th Jan 2024
By Ash Shatrieh of F-Secure
Small businesses targeted by cyber criminals for data
Thu, 21st Dec 2023
By Caitlin Condon and Christiaan Beek of Rapid7
2024 cybersecurity: Swap ChatGPT predictions for key re...
Tue, 19th Dec 2023
Top players
You can read more from the top players Commvault, Acronis, Amazon Web Services, Veeam, and Barracuda.
Recent news
About Data residency
Adobe CJA secures IRAP assessment for personalised digi...
Yesterday
About Artificial Intelligence
Cloudflare launches Defensive AI for threat protection
Last week
About Investment
Lisbon's Vawlt Technologies secures €2.15m for superclo...
Last week
About Key management
Utimaco & InfoSec Global partner for post-quantum compu...
Last week
About Privacy
Magentus, Google Cloud to revolutionise healthcare with...
This month
More expert columns
By Caitlin Condon and Christiaan Beek of Rapid7
2024 cybersecurity: Swap ChatGPT predictions for key re...
Tue, 19th Dec 2023
By Kamal Brar of Confluent
2024: why it’s time to answer the big AI questions
Mon, 11th Dec 2023
By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Thu, 30th Nov 2023
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Fri, 24th Nov 2023
By Jamie Pitchforth of Juniper Networks
Supporting the future of work by transforming hybrid wo...
Thu, 23rd Nov 2023
By Jonathan Beeby of SAP Concur Australia and New Zealand
How organisations can reduce security and compliance ri...
Wed, 22nd Nov 2023
Even more expert columns
By Jonathan Beeby of SAP Concur Australia and New Zealand
How organisations can reduce security and compliance ri...
Wed, 22nd Nov 2023
By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Mon, 13th Nov 2023
By Bryan Saba of Excite Cyber
Cybersecurity is full of fear –we need to change this
Fri, 3rd Nov 2023
By Alastair Paterson of Harmonic Security
Hopes for the global Artificial Intelligence summit
Mon, 30th Oct 2023
By Chris Barton of Absolute Software
Now is the time for self-healing systems in healthcare
Wed, 25th Oct 2023
By Mark Jones of Tesserent
Data is not gold – it's uranium so handle with care
Mon, 23rd Oct 2023
By Lena Fuks of Aqua Security
Five misconfigurations threatening your AWS environment...
Fri, 20th Oct 2023
By Ilan Rubin of Wavelink
Four steps organisations can take to improve cybersecur...
Thu, 19th Oct 2023
By Brett Raybould of Menlo Security
ChatGPT is here to stay: Can organisations harness it s...
Thu, 19th Oct 2023
By Tim O’Neill of BitTitan
Why it’s vital to take a holistic approach to cybersecu...
Tue, 17th Oct 2023
More news
About Spend management
Payhawk to boost London workforce by 44% following reve...
This month
About Public Cloud
NetApp boosts Gen AI projects with NVIDIA partnership
This month
About Machine learning
NetApp pioneers AI-driven ransomware defence for custom...
This month
About Productivity
Sage reveals AI-powered assistant for accounting & fina...
This month
About Software-as-a-Service
Veeam unveils new Data Cloud BaaS for Microsoft 365 & A...
This month
Even more news
About Hackers
HackerOne launches AI co-pilot Hai to improve vulnerabi...
Last month
About Ethics
43% of enterprises investing in breakthrough GenAI tech...
Last month
About Cloud Services
NinjaOne & SentinelOne redefine endpoint protection wit...
Last month
About Cloud Services
Acronis launches robust cyber protection product to tac...
Last month
About Business Continuity
Veeam partners with Kyndryl for enhanced cyber resilien...
Last month
Job moves
Move at Juniper Networks
Veeam Software promotes Macro Zhang to VP of Channel St...
This month
Move at Acronis
Acronis appoints Kelly Johnson as General Manager for A...
Last month
Move at Commvault
Commvault expands APAC team with strategic senior appoi...
Tue, 12th Dec 2023
Move at Job moves
Barracuda Networks appoints Patrick O'Donnell as SVP, W...
Thu, 16th Nov 2023
Move at Growth
Veeam Software appoints Chua Chee Pin as Vice President...
Wed, 15th Nov 2023
Other guides
You can read other related guides from Cybersecurity, Cloud Services, Breach Prevention, Artificial Intelligence, and Disaster Recovery.
Powered by