The Ultimate Guide to Data Protection
2023 edition
Overview
Data is the lifeblood of many organisations, which is why protecting it at all costs is so important.
Not only is data protection essential from a business operational sense, but legally many laws say data must be protected as well.
Data Protection is a term often used in a legal context (such as the General Data Protection Regulation) and involves the security, privacy, availability, and integrity of data.
Companies should engage in the concept of data protection by mitigating cyber risk and utilising strategies to keep their data safe and secure.
Expert columns
.webp)
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Last week

By Jamie Pitchforth of Juniper Networks
Supporting the future of work by transforming hybrid wo...
Last week

By Jonathan Beeby of SAP Concur Australia and New Zealand
How organisations can reduce security and compliance ri...
Last week

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
This month

By Bryan Saba of Excite Cyber
Cybersecurity is full of fear –we need to change this
This month
More expert columns

By Alastair Paterson of Harmonic Security
Hopes for the global Artificial Intelligence summit
Last month

By Chris Barton of Absolute Software
Now is the time for self-healing systems in healthcare
Last month

By Mark Jones of Tesserent
Data is not gold – it's uranium so handle with care
Last month

By Lena Fuks of Aqua Security
Five misconfigurations threatening your AWS environment...
Last month

By Ilan Rubin of Wavelink
Four steps organisations can take to improve cybersecur...
Last month

By Brett Raybould of Menlo Security
ChatGPT is here to stay: Can organisations harness it s...
Last month
Top players
You can read more from the top players Commvault, Veeam, Amazon Web Services, Acronis, and Barracuda.
Recent news

About Netskope
Telstra International expands Netskope partnership for ...
Last week

About Microsoft
Cohesity & Microsoft enhance data recovery in Microsoft...
This month

About Network Infrastructure
SpeQtral & SPTel to construct Singapore's first quantum...
This month

About Veeam
Veeam unveils Backup for Salesforce v2 offering enhance...
This month

About Market
Predicted growth in cloud-based Electronic Laboratory N...
This month
More expert columns

By Brett Raybould of Menlo Security
ChatGPT is here to stay: Can organisations harness it s...
Last month

By Tim O’Neill of BitTitan
Why it’s vital to take a holistic approach to cybersecu...
Last month

By Bogdan Botezatu of Bitdefender
From data breaches to account compromise: how hackers u...
Last month

By Billy Loizou of Amperity
Adapting to latest privacy regulations: Experts weigh i...
Last month

By Michelle Tan of StarHub
Safeguarding your business from escalating DDoS attacks
Last month

By Jennifer Cheng of Proofpoint
Unmasking cyber criminals: The power of privileged iden...
Mon, 25th Sep 2023
Even more expert columns

By Jennifer Cheng of Proofpoint
Unmasking cyber criminals: The power of privileged iden...
Mon, 25th Sep 2023

By John Stock of Outpost24
Technology, processes and people: The triad of cybersec...
Wed, 20th Sep 2023

By Joel Hanrahan
Preventing disloyal MICE in the company floorboards
Mon, 18th Sep 2023

By David Bingham of The Missing Link
A practical approach to modern Data Security
Mon, 18th Sep 2023

By Michael Jenkins of ThreatLocker
Charity breach dark web leak: A lesson in cyber respons...
Mon, 18th Sep 2023

By Sojung Lee of TeamViewer
A cybersecurity checklist: What every team needs to kno...
Fri, 15th Sep 2023

By Alex Low of StarHub Enterprise Business Group
If you are using public WiFi for work, stop!
Tue, 12th Sep 2023

By Dan Smale of Fasthosts ProActive
Costly IT mistakes: Identifying and avoiding vendor loc...
Fri, 25th Aug 2023

By Michael Woods of Nexon Asia Pacific
Maximising your MSP partnership: How to choose a certif...
Mon, 14th Aug 2023

By Yvette Lejins of Proofpoint
Should Australian CISOs be wary of creeping confidence?
Fri, 28th Jul 2023
More news

About Software-as-a-Service
Vultr, DDN partner to enhance AI & data management solu...
This month

About Commvault
Commvault launches new AI-powered platform to boost cyb...
This month

About Versent
Australians dubious about data security & AI, reveals V...
This month

About Zscaler
Zscaler advances cloud security with unique native AWS ...
This month

About Progress
Immuta's report reveals global struggle to stay abreast...
This month
Even more news

About Enterprise
Kasten by Veeam unveils enhanced security features in K...
This month

About Red Hat
Dell's ObjectScale XF960 reshapes object storage with s...
This month

About Commvault
Commvault partners with AI & security firms for improve...
This month

About TeamViewer
TeamViewer integrates Tensor with SAP Service Cloud for...
This month

About Malware
WithSecure expands Cloud Protection for Salesforce to A...
This month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Cloud Services, Disaster Recovery, and Artificial Intelligence.
Powered by