data security
-
Data and Security
Shadow IT: Definition, Risks, and Countermeasures
Author: Talabuyev Y. Gartner has estimated that over 40% of employees use technologies that are not managed by their IT…
Read More » -
Data and Security
5 Steps to Implementing an Effective Disaster Recovery Strategy
Author: Talabuyev Y. Research shows that every business is at risk. Ransomware alone causes enormous damage, both in terms of…
Read More » -
Data and Security
Key Trends in Data Protection and Recovery According to Veeam
Author: Talabuyev Y. Veeam has prepared a report on “Trends in Data Protection,” surveying over 1200 IT directors and implementation…
Read More » -
Corporate IT
How to Test the Cloud: The Essentials of Testing Virtual Resources (IaaS)
Author: Mykhailenko A. There are at least three possible approaches that fall under the concept of “cloud testing”: testing cloud…
Read More » -
Data and Security
What Is Serverless Computing?
One of the ways to get a productive and scalable environment for running software code is to use serverless computing.…
Read More » -
Data and Security
What is Cloud Security?
Cloud security combines policies, practices, approaches and technologies to ensure cybersecurity and protection of applications and data in cloud environments.…
Read More »