Security

5 Top Security Assessment Trends in 2022

Think about the amount of information that is available today. It amounts to hundreds of zettabytes.  Yet, the bulk of security attention is aimed at...

5 Top Network Segmentation Trends in 2022

Storage has always used architectures that split large amounts of something into smaller segments.  There are disks, drives, partitions, physical and logical volumes, and logical...

Top Penetration Testing Trends in 2022

Penetration testing is growing in prominence.  Instead of defend, defend, defend against unseen attacks that could come from anywhere, a different view is needed: Look...

5 Top Data Classification Trends in 2022

Data classification is an essential aspect of the storage of enterprise data.  In addition to helping organizations manage and search their data repositories, data classification...

5 Top Unified Threat Management Trends in...

Unified threat management (UTM) emerged in recent years largely in response to blended threats consisting of malware combos using multiple attack vectors simultaneously.  UTM offered...

5 Top Endpoint Detection and Response Trends...

Storage managers and backup administrators have mostly considered themselves aloof from the concerns of mere endpoints.  What might be happening on PCs, laptops, and mobile...

Latest Articles

5 Top Security Assessment Trends in 2022

Think about the amount of information that is available today. It amounts to hundreds of zettabytes.  Yet, the bulk of security attention is aimed at...

5 Top Network Segmentation Trends in 2022

Storage has always used architectures that split large amounts of something into smaller segments.  There are disks, drives, partitions, physical and logical volumes, and logical...

Top Penetration Testing Trends in 2022

Penetration testing is growing in prominence.  Instead of defend, defend, defend against unseen attacks that could come from anywhere, a different view is needed: Look...
- Advertisement -