The Ultimate Guide to Data Protection
2025 edition
Overview
Data is the lifeblood of many organisations, which is why protecting it at all costs is so important.
Not only is data protection essential from a business operational sense, but legally many laws say data must be protected as well.
Data Protection is a term often used in a legal context (such as the General Data Protection Regulation) and involves the security, privacy, availability, and integrity of data.
Companies should engage in the concept of data protection by mitigating cyber risk and utilising strategies to keep their data safe and secure.
Analyst reports

Canalys on Email Security
Acronis stops 7.5 million cyberattacks as platform grow...
Last month

Gartner on Risk & Compliance
How to sell security and compliance
Last month

Frost & Sullivan on EduTech
Utimaco launches Quantum Protect for post-quantum secur...
Last month

Gartner on DR
Australia's AI adoption spurs call for proactive securi...
Mon, 31st Mar 2025

IDC MarketScape on Digital Transformation
Publicis Sapient joins forces with AWS for AI cloud sol...
Wed, 12th Mar 2025
Featured news

About Sustainability
Exclusive: How Greenbox tackles tech waste with data se...
Yesterday

About Threat intelligence
Google Cloud unveils AI-powered Unified Security platfo...
Last month

About Storage
Synology's pushing into ANZ enterprise storage & backup...
Last month

About Collaboration
Exclusive: How Commvault strengthens APAC partner ecosy...
Last month

About Ransomware
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month

About Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

About Data Analytics
Exclusive: Businesses face growing challenges in managi...
Fri, 21st Feb 2025
Expert columns

By Saeed Abbasi of Qualys
Six cybersecurity trends you can't afford to ignore in ...
2 days ago

By Victoria Boryaeva of Pulseway
Essential Eight: Full cyber resilience through complian...
4 days ago

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month

By Mark Devlin of Impact PR
How to manage Communications during a cyber attack
Last month

By George Dragatsis of Hitachi Vantara
Australian organisations have two key reasons to double...
Last month
Interviews

Discussing Sustainability
Exclusive: How Greenbox tackles tech waste with data se...
Yesterday

Discussing Threat intelligence
Google Cloud unveils AI-powered Unified Security platfo...
Last month

Discussing Storage
Synology's pushing into ANZ enterprise storage & backup...
Last month

Discussing Collaboration
Exclusive: How Commvault strengthens APAC partner ecosy...
Last month

Discussing Ransomware
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month
More expert columns

By Glenn Maiden of Fortinet
Proactive actionable intelligence leading contemporary ...
Last month

By Scott Hesford of BeyondTrust
Just-in-time access emerges as key to mitigating risk
Last month

By Karl Harris of Gallagher Security
A step ahead: How Gallagher’s Security Readiness Guide ...
Last month

By Chris Fisher of Vectra AI
Outpacing AI-Driven cyber attacks: Strategies for moder...
Last month

By Robin Long of Rapid7
Securing the cloud: Why cyber vigilance must keep pace ...
Fri, 28th Mar 2025

By Jack Meltzer of Gallagher Security
Building a culture of cyber hygiene
Tue, 18th Mar 2025
Recent news

About Cloud Services
Rubrik & Rackspace team up for rapid post-cyber attack ...
Yesterday

About Storage
Dell & Nutanix unveil integrated storage for hybrid IT
Yesterday

About Machine learning
OVHcloud launches AI Endpoints for serverless model acc...
Yesterday

About Malware
Low-tech phishing scams on the rise as criminals shift ...
2 days ago

About Bring Your Own Device
Palo Alto Networks unveils Prisma SASE browser for AI s...
2 days ago
More news

About Firewalls
CrowdStrike launches unified data protection for AI & c...
2 days ago

About Timeline
Over half of firms prepare for post-quantum cryptograph...
2 days ago

About Software-as-a-Service
CrowdStrike unveils new AI & cloud tools for cyber defe...
2 days ago

About Recruitment
AI transforms hiring but human judgement remains vital
3 days ago

About Enterprise security
Akamai launches firewall to protect enterprise AI from ...
3 days ago
Even more news

About Enterprise security
Varonis unveils AI Shield to defend sensitive data in r...
3 days ago

About Ransomware
Commvault Cloud secures GovRAMP Authorised High impact ...
3 days ago

About Hybrid Cloud
Commvault & CrowdStrike unite to enhance cyber resilien...
3 days ago

About Ransomware
Commvault unveils enhanced Cleanroom Recovery to cut do...
3 days ago

About Public Sector
Police warned over shifting information to Microsoft cl...
4 days ago
Job moves

Move at Imprivata
Imprivata appoints Joel Burleson-Davis as new chief tec...
Last week

Move at Application Security
Ketan Tailor appointed as Barracuda's Chief Customer Of...
Last month

Move at Black Talon Security
Black Talon Security promotes Paul Murphy to growth rol...
Last month

Move at Microsoft
Drew Gardner appointed as Veeam's UK & Ireland VP
Last month

Move at Commvault
Bill O'Connell appointed Chief Security Officer at Comm...
Last month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Advanced Persistent Threat Protection, Data Privacy, and Risk & Compliance.
Powered by