How can data availability be compromised?
What is data availability? Data availability, one of the three pillars of the CIA triad, describes the reliability, accessibility, and timeliness of data. It’s what… Read More »How can data availability be compromised?
All about Ransomware
Have you ever wondered where all the fuss about ransomware comes from? Surely you’ve heard about it at work or read about it in the… Read More »All about Ransomware
Pivoting from infrastructure resilience to true data resilience
The idea was straightforward: If data center A became unavailable for any reason, data center B would take over. Setting up and maintaining two identical… Read More »Pivoting from infrastructure resilience to true data resilience
Why is data resilience important?
What is data resilience? Data resilience can mean different things to different organizations. As a Carnegie Mellon University literature review notes, the concept of resilience… Read More »Why is data resilience important?
The Federal Intelligence Service (FIS) is concerned that Russia could use Swiss servers as part of campaigns to destabilise western democracies, according to a newspaper report.
An internal FIS document, seen by the SonntagsBlick, says a direct attempt to influence Swiss parliamentary elections next year is unlikely. However, it is “likely that… Read More »The Federal Intelligence Service (FIS) is concerned that Russia could use Swiss servers as part of campaigns to destabilise western democracies, according to a newspaper report.
New version Performance Monitor (Release 2022.2)
On July 10, 2022, we published a new version of Performance Monitor for Oracle, Microsoft SQL Server, PostgreSQL and SAP Hana databases. The most important… Read More »New version Performance Monitor (Release 2022.2)
The chipmunks are coming: Appreciating the motivation of threat actors
At the point in time of our story, I’d worked from home for about 10 years, and the shine of my basement office had worn… Read More »The chipmunks are coming: Appreciating the motivation of threat actors
Cold storage migration to the cloud is heating up for CISOs
Additionally, research by Enterprise Strategy Group finds 33% of companies still use tape and, in their 2021 annual report, storage leader Iron Mountain says storage… Read More »Cold storage migration to the cloud is heating up for CISOs
Can ransomware infect encrypted files?
The European Union Agency for Cybersecurity (ENISA) noted a 150% rise in ransomware attacks between 2020 and 2021, while a Cybersecurity Ventures report estimated that… Read More »Can ransomware infect encrypted files?