Search Disaster Recovery
Login Register
Informa TechTarget Explore the Network
  • Data Backup
  • Storage
  • Security
  • CIO
  • IT Operations
An Informa TechTarget Publication Explore our brands
  • Search Disaster Recovery
    • Cloud DR
    • Facilities & Operations
    • Planning and Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

News

Vendor Resources
  • Redefining Cyber Recovery: Introducing Mean Time to Clean Recovery –White Paper
  • The Cyber Resilience Reckoning: A New Strategy for Surviving the Agentic Threat... –eBook
  • Cyber resilience in the ransomware era –eBook
Latest TechTarget resources
  • Data Backup
  • Storage
  • Security
  • CIO
  • IT Operations
Search Data Backup
  • Why leadership should be involved in data backup policies

    While IT administrators lead the day-to-day operations of data backups, business leaders have a key role to play in shaping their...

  • Sorry, backups are just not enough to guarantee restoration

    Your organization's ability to recover after a crisis depends on several factors. Our included action plan goes beyond data ...

  • Data fragmentation is a major hurdle to future-ready backups

    Data fragmentation has largely been considered beneficial to a data protection strategy. Some IT leaders now view it as a ...

Search Storage
  • Solving quantum computing's longstanding no-cloning problem

    University of Waterloo proposes encrypted qubit encodings that enable one-time reconstruction, reframing quantum data resilience,...

  • The storage modernization imperative in a fast-changing IT landscape

    As IT leaders push for storage modernization, Omdia study finds 80% of IT leaders believe it critical to IT effectiveness for ...

  • Enterprises face new storage bottlenecks as AI grows

    For CIOs and IT leaders, AI performance depends on storage. See how strategies like NVMe and parallel file systems can prevent ...

Search Security
  • CISO's guide to centralized vs. federated security models

    CISOs must juggle flexibility, consistency and risk when considering the enterprise's security structure. Discover the benefits ...

  • What are the most common authentication methods?

    To authenticate users, security teams have a range of options available. Note, however, that a combination of methods is the best...

  • Shadow code: The hidden threat for enterprise IT

    The shadow code running in your web apps could be a ticking time bomb. Learn more about the cybersecurity risks of shadow code ...

Search CIO
  • Strategic IT outlook: Tech conferences and events calendar

    Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...

  • AI Security Risks Force CIOs to Rethink Strategy

    In this Q&A, Michael Spisak of Unit 42, Palo Alto Networks, explains the cybersecurity risks and opportunities that enterprises ...

  • Tokenmaxxing: How CIOs can extract maximum value from AI tokens

    Tokenmaxxing is the key to mastering AI costs. Discover how enterprises can optimize token usage, reduce waste and scale AI ...

Search ITOperations
  • Red Hat Summit 2026 news and conference guide

    Informa TechTarget's guide to Red Hat Summit 2026 covers the latest trends, emerging technologies and information from the annual...

  • Merck, Home Depot tap Gemini Enterprise for AI agent development

    Blue chips will expand use of Gemini Enterprise AI agents on a revamped platform, but how far its appeal will extend beyond the ...

  • Gemini Enterprise Agent Platform adds 'connective tissue' to Vertex AI

    Gemini Enterprise expands multi-agent orchestration, data management and security features, flexing Google Cloud's infrastructure...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close