Search Disaster Recovery
Login Register
Explore the Network
  • TechTarget Network
  • Data Backup
  • Storage
  • Security
  • CIO
  • Search Disaster Recovery
    • Cloud DR
    • Facilities & Operations
    • Planning and Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

Get started

Bring yourself up to speed with our introductory content.

Vendor Resources
  • When Disaster Strikes A Guide to Data Recovery and Business Continuity –White Paper
  • Step-by-step disaster recovery planning guide –eBook
  • Computer Weekly – 17 April 2018: Can China's Alibaba successfully take on the ... –Ezine
Latest TechTarget resources
  • Data Backup
  • Storage
  • Security
  • CIO
Search Data Backup
  • SaaS shared responsibility model: What vendors don't cover

    Don't let your organization lose cloud data to misplaced trust and thin vendor protections. Learn what providers don't cover and ...

  • 4 long-term backup options for enterprise data

    Data backups ensure copies of critical data are available in the event of a crisis or failure. When backing up long-term data, ...

  • Ways to protect data platforms from turnover risk

    Departing data employees can take valuable Institutional knowledge. Protect it with consistent documentation, a central ...

Search Storage
  • IBM FlashSystem adds 105 TB modules with agentic AI smarts

    IBM FlashSystem refresh includes a high-capacity flash module amid a memory supply crunch and automated data placement at block ...

  • 9 ways to ensure regulatory compliance in cloud storage

    As cloud compliance becomes increasingly important in 2026, follow these 9 steps to ensure regulatory compliance.

  • A primer on DNA data storage

    DNA storage is an emerging technology that has the potential to impact data storage in the long term. Learn more about how it ...

Search Security
  • CISO's guide: How to prevent business email compromise

    Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, ...

  • News brief: 6 Microsoft zero days and a warning from CISA

    Check out the latest security news from the Informa TechTarget team.

  • ASU's CISO: AI craze is a strategic opportunity for security

    All eyes in the C-suite are on AI, and Arizona State University's CISO is seizing the moment. Learn how AI is solving problems ...

Search CIO
  • ESG for IT: How CIOs can drive environmental sustainability

    Sustainability as a business initiative has rocketed up the priority list as investors, consumers and legislators demand ...

  • How CIOs can tackle subscription sprawl and costs

    As subscription models expand, hidden costs and risks grow with them. IT leaders need stronger visibility and accountability to ...

  • Market whiplash: Why CIOs can't plan for volatility

    Extreme swings in bitcoin, precious metals and rare earths are breaking IT cost forecasts, increasing vendor risk and forcing ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close