28 October 2016 by Sam Wiltshire
For something a bit different, we've created a free Chrome extension which will spookify your browsing!
21 October 2016 by Michael Nuncic
Wear levelling is a very useful technique that improves the longevity of an SSD.
18 October 2016 by Milagros Gamero
Discover the top triggers that initiate the need to restore data from archive tapes, and the technical issues that make legacy data difficult to manage.
11 October 2016 by Michael Nuncic
Two-Dimensional Magnetic Recording, Heat-Assisted Magnetic Recording, and Bit-Patterned Magnetic Recording: we explore the future of HDD technology.
07 October 2016 by Michael Nuncic
Discover the upcoming technologies that will help HDD maintain its lead in the storage device market.
04 October 2016 by Phil Bridge
Penalties for not complying with EU rules are now more severe. How can companies ensure they secure erasure of data they aren’t allowed to possess anymore?
30 September 2016 by Phil Bridge
The EU is strengthening individuals’ right to erasure and the right to be forgotten. We explore how this will affect the way organisations manage their data.
27 September 2016 by Antoine Valette
In light of the Yahoo! breach in 2014 personal data security has never been more important. Follow these 7 tips to avoid being hacked.
23 September 2016 by Antoine Valette
With internet democratisation, users are increasingly vulnerable to cyberattacks. Here are some tips and tricks that can help protect ourselves from hackers.
21 September 2016 by Massimo Mazza
Is homomorphic encryption the key to security in the cloud? Discover the pros and cons of this technology.
16 September 2016 by Kathrin Brekle
Whether a smartphone, tablet, Windows PC or Mac: nowadays keeping an up-to-date backup (at least for your most important data) is a must-have.
13 September 2016 by Sam Wiltshire
Pokemon Go has introduced many people to augmented reality. What's next for this technology?
09 September 2016 by Robin England
The increased adoption of wearables opens a new threat to security in corporate data that needs to be incorporated into the IT security plan.
06 September 2016 by Sam Wiltshire
Find out how sports such as football, rugby and cycling have embraced data analytics to improve performance.
26 August 2016 by Sam Wiltshire
Data and APIs are now at the heart of many of the world's most innovative apps. Here's five examples of how the technology can be used.
23 August 2016 by Sam Wiltshire
How will the era of big data change how firms view their data centre? Read our latest blog to find out.
16 August 2016 by Milagros Gamero
Storage servers explained: how to choose the system that’s right for you, how to prevent data loss, and how to avoid further loss after a disaster.
11 August 2016 by Sam Wiltshire
We’ve compiled 50 data storage brands into one cryptic image – be the first three to guess all 50 and win the Kroll Ontrack #CrypticData competition!
05 August 2016 by Milagros Gamero
Physical media damage explained. Discover the different levels of data loss and in what situations can data be recovered.
02 August 2016 by Milagros Gamero
Sometimes computer forensics and data recovery join forces to provide a comprehensive service to support legal proceedings. We explore these situations here.