Search Disaster Recovery
Login Register
Explore the Network
  • TechTarget Network
  • Data Backup
  • Storage
  • Security
  • CIO
  • Search Disaster Recovery
    • Cloud DR
    • Facilities & Operations
    • Planning and Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

News

Vendor Resources
  • When Disaster Strikes A Guide to Data Recovery and Business Continuity –White Paper
Latest TechTarget resources
  • Data Backup
  • Storage
  • Security
  • CIO
Search Data Backup
  • Implement backup reporting for improved data governance

    Data visibility and governance are more important than ever in 2026. Reporting can help ensure that your organization understands...

  • Magnetic tape backup eases storage cost and capacity concerns

    Data growth can strain already thin budgets. Today's LTO-10 tapes provide dense capacity at lower costs than cloud storage that ...

  • Veeam releases Agent Commander to combat agentic AI risk

    Agent Commander is the first feature to come out of the vendor's acquisition of Securiti AI in December of last year.

Search Storage
  • Biomemory's Catalog buy speeds DNA data storage development

    Biomemory's acquisition of Catalog Technologies gives it key patents and infrastructure. Will it be enough to make DNA data ...

  • Data storage management: What is it and why is it important?

    Effective data storage management is more important than ever, as security and regulatory compliance have become even more ...

  • Vast Data services speed up AI workloads, add intelligence

    New services and features from Vast aim to tackle AI workload bottlenecks by embedding more intelligence at the data storage ...

Search Security
  • Should a CISO have an MBA?

    Cybersecurity leaders are often asked to weigh in more frequently on business decisions. This could give MBA-holding CISOs a more...

  • How to reduce false positive alerts and increase cybersecurity

    False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root ...

  • How to perform a data risk assessment, step by step

    Data risk assessments review how an organization protects its sensitive data and identify necessary improvements by revealing ...

Search CIO
  • How big tech AI talent poaching affects the AI talent wars

    Big tech companies are fiercely competing for AI talent. These talent wars drive up compensation, use aggressive strategies to ...

  • What CIOs can learn from Marc Benioff's ICE joke

    Marc Benioff's ICE agent joke at a Salesforce all-hands meeting puts spotlight on IT system and operational risks with ...

  • AI workforce training: How BDO USA trains its employees

    Getting employees comfortable with AI is tough for CIOs. BDO USA uses AI ambassadors, tailored training and a virtual escape room...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close