Applying RAID to the Cloud for Data Resilience
You’ve likely heard about RAID in the context of disk storage. But did you know its approach can be applied to object storage in the… Read More »Applying RAID to the Cloud for Data Resilience
You’ve likely heard about RAID in the context of disk storage. But did you know its approach can be applied to object storage in the… Read More »Applying RAID to the Cloud for Data Resilience
Data privacy, confidentiality, and resilience processes often require multiple steps and significant processing power to be implemented into an application. This can be a drag… Read More »Data Security Offloading: A Guide
Shadowy rooms and blinking server racks. Rows of laptops and hyper-focused coders in hoodies. Devious actors with an encyclopedic knowledge of data networks and system… Read More »The Rise of Ransomware as a Service: What It Means, and What We Can Do
Ben Franklin is credited with saying, “In this world, nothing is certain except death and taxes.” Were he alive today, he might have added “…and… Read More »Expert Advice: Data Protection for GDPR and Schrems II Compliance
Phishing attacks have been around for years, but attackers are getting smarter. They’re now using new methods like smishing and vishing to try and steal… Read More »Attackers Are Getting Smarter: What You Need To Know About Smishing and Vishing
Security errors are common. No, really common.
The last two years of the pandemic accelerated cloud adoption for organizations of all sizes. But now that the dust has settled, enterprises have an… Read More »Reassessing Data Risk in the Cloud? A Chief IT Risk Officer’s Advice
Database Performance Monitor allows to fully automatic performance diagnostics of Oracle, MS SQL, PostgreSQL, SAP Hana and Amazon Redshift databases. If a problem or performance… Read More »Anomaly Monitor in SQL instance
Client-side encryption has long been the gold standard for data protection. It keeps third-party infrastructure or storage providers from viewing your sensitive data, and it… Read More »An Alternative to Client-Side Encryption
Building skyscrapers. Composing symphonies. Walking on the moon. Humans prove all the time that we’re capable of truly incredible accomplishments.