article thumbnail

Storage and Data Protection News for the Week of March 3; Updates from IBM, Pure Storage, Veeam & More

Solutions Review

introducing extreme high availability for PostgreSQL—up to 99.999%+ availability via active-active technology, according to the vendor. The three challengers are adoption of AI/ML and HPC workloads; hybrid cloud app transformation and data movement from edge-to-core-to-cloud; and ensuring data resiliency in the face of malware.

article thumbnail

33 Data Privacy Week Comments from Industry Experts in 2023

Solutions Review

Given the public clouds like AWS, Azure and Google Cloud are highly available and reliable, DevOps and IT Ops teams may believe that their data is safe and secure in the cloud, such that they don’t need to do backups. It should be impervious to EMPs, salt water, high temps, and altitudes. But you can’t leave it all to the algorithms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Privacy Week 2024: The Definitive Roundup of Expert Quotes

Solutions Review

Cybercriminals use open-source intelligence (OSINT) to create plausible backstories in seconds, usually utilizing social media profiles to gather information about a victim’s career, hobbies, and habits. Depending on what you find, you may need to review what you’re posting on social media.

article thumbnail

45 World Backup Day Quotes from 32 Experts for 2023

Solutions Review

A third trend with ransomware is actually encouraging – more ultra-resilient media types than ever. Ransomware will put a data backup strategy to the test and having a copy on an ultra-resilient media is the best way to get out of that problem. In the end, what we want data backup to do is get a business out of a problem.

Backup 119
article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

Cybercriminals use open-source intelligence (OSINT) to create plausible backstories in seconds, usually utilizing social media profiles to gather information about a victim’s career, hobbies, and habits. Depending on what you find, you may need to review what you’re posting on social media.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

Cybercriminals use open-source intelligence (OSINT) to create plausible backstories in seconds, usually utilizing social media profiles to gather information about a victim’s career, hobbies, and habits. Depending on what you find, you may need to review what you’re posting on social media.