The Ultimate Guide to Data Protection
2023 edition
Overview
Data is the lifeblood of many organisations, which is why protecting it at all costs is so important.
Not only is data protection essential from a business operational sense, but legally many laws say data must be protected as well.
Data Protection is a term often used in a legal context (such as the General Data Protection Regulation) and involves the security, privacy, availability, and integrity of data.
Companies should engage in the concept of data protection by mitigating cyber risk and utilising strategies to keep their data safe and secure.
Analyst reports

Gartner on CX
Fines for mismanagement of data expected to reach $1Bn
Last month

Gartner on Commvault
Commvault named leader for enterprise backup and recove...
Last month

Gartner on Managed Services
11:11 joins AWS partner network to provide data protect...
Mon, 24th Jul 2023

Forrester Research on Cloud Services
Barracuda accelerates growth in its data protection bus...
Fri, 30th Sep 2022
Expert columns

By Jennifer Cheng of Proofpoint
Unmasking cyber criminals: The power of privileged iden...
2 days ago

By John Stock of Outpost24
Technology, processes and people: The triad of cybersec...
Last week

By Joel Hanrahan
Preventing disloyal MICE in the company floorboards
Last week

By David Bingham of The Missing Link
A practical approach to modern Data Security
Last week

By Michael Jenkins of ThreatLocker
Charity breach dark web leak: A lesson in cyber respons...
Last week
More expert columns

By Sojung Lee of TeamViewer
A cybersecurity checklist: What every team needs to kno...
This month

By Alex Low of StarHub Enterprise Business Group
If you are using public WiFi for work, stop!
This month

By Dan Smale of Fasthosts ProActive
Costly IT mistakes: Identifying and avoiding vendor loc...
Last month

By Michael Woods of Nexon Asia Pacific
Maximising your MSP partnership: How to choose a certif...
Last month

By Yvette Lejins of Proofpoint
Should Australian CISOs be wary of creeping confidence?
Fri, 28th Jul 2023

By Matt Caffrey of Barracuda
Cloud-driven data protection – an Australian company’s ...
Tue, 25th Jul 2023
Top players
Recent news

About Gartner
Commvault named highest in six use cases by 2023 Gartne...
Yesterday

About Norton
Norton launches Secure Browser to halt cyber criminals
Last week

About Cisco
Cisco acquires Splunk for $28 billion, CEO joins leader...
Last week

About CrowdStrike
Salt Security amplifies API security partnership with C...
Last week

About CrowdStrike
Data Protection, Exposure Management, and IT Automation...
Last week
More expert columns

By Matt Caffrey of Barracuda
Cloud-driven data protection – an Australian company’s ...
Tue, 25th Jul 2023

By Mark Gorrie of Norton
Is ChatGPT’s use of our personal data even legal?
Tue, 25th Jul 2023

By Jonathan Beeby of SAP Concur Australia and New Zealand
Preventing invoice fraud with automated invoice process...
Tue, 11th Jul 2023

By Armando Dacal of DigiCert
Preparing businesses' digital trust for a post-quantum ...
Tue, 11th Jul 2023

By Dave Curtis of RobobAI
Why you should work with ISO 27001-Certified tech vendo...
Tue, 11th Jul 2023

By Karen Dooley of Secure by Design
Changing the way the MOD manages cyber resilience for t...
Tue, 11th Jul 2023
Even more expert columns

By Karen Dooley of Secure by Design
Changing the way the MOD manages cyber resilience for t...
Tue, 11th Jul 2023

By Igor Portugal
Why regulating AI could have serious ramifications
Tue, 4th Jul 2023

By Akhil Bhutani of APJ Business
Why mobile security protection is a public necessity
Fri, 30th Jun 2023

By Deryck Mitchelson of Check Point Software
How does your company's board measure cyber resilience?
Tue, 27th Jun 2023

By Jack Misiura
Red Teaming vs. Penetration Testing: What's the differe...
Wed, 21st Jun 2023

By Nitin Upadhyay of RobobAI
AI augments dead data into new realms of strategic narr...
Wed, 7th Jun 2023

By Jack Misiura of The Missing Link
Input Validation and the problems with Sanitisation
Tue, 30th May 2023

By Shani Czyzyk of Radware
How threat intelligence can improve DDoS protection
Fri, 26th May 2023

By Antti Nivala of M-Files
How businesses can get the most out of workflow automat...
Tue, 21st Mar 2023

By James Cook of Entrust
Public Key Infrastructure adoption and the future of cy...
Wed, 8th Mar 2023
More news

About GigaOm
Commvault named an Outperformer in GigaOm Radar Report
This month

About Sales
Loyalty Now lists digital loyalty program benefits for ...
This month

About Cyber Criminal
Australia is 5th most hacked worldwide, says cybersecur...
This month

About Ransomware
Two in three companies lose data due to no backups: Apr...
This month

About Qlik
Data leaders should balance governance and innovation: ...
Last month
Even more news

About Data management
Quest Software aids data management with Data Modeler 1...
Last month

About Amazon
Commvault extends integration with AWS to improve data ...
Last month

About Cloud Storage
Amidata launches new secure cloud storage service
Last month

About Multi-factor authentication
Are your shared workstations secured against cyber atta...
Mon, 31st Jul 2023

About Developers
Vonage's Protection Suite aims to safeguard against fra...
Tue, 25th Jul 2023
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Cloud Services, Disaster Recovery, and Artificial Intelligence.
Powered by