article thumbnail

Introducing the Pure//Launch Blog

Pure Storage

Introducing the Pure//Launch Blog by Pure Storage Blog The Pure Storage data storage platform is the most innovative in the industry, constantly evolving to meet your data storage needs. The post Introducing the Pure//Launch Blog appeared first on Pure Storage Blog. Upgrade to Purity//FA 6.6.4

Capacity 116
article thumbnail

Pure//Launch Blog October Edition

Pure Storage

Pure//Launch Blog October Edition by Pure Storage Blog Summary We’ve been hard at work making enhancements to the Pure Storage platform to augment data protection, help you get more out of your Kubernetes environment, triage issues faster, and more. We’re never finished innovating here at Pure Storage. Upgrade to Purity//FA 6.6.8,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Architecture Blog Posts of 2023

AWS Disaster Recovery

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. As always, thanks to our readers and to the many talented and hardworking Solutions Architects and other contributors to our blog. I give you our 2023 cream of the crop! #4:

article thumbnail

Election Security

Disaster Zone Podcast

Election security has been in the news since 2020. How secure are elections in the United States and what specifically makes vote by mail a secure way to cast your ballot? He is charged with the executive oversight of the Washington Secretary of State's Elections and Information Security & Response divisions.

Security 130
article thumbnail

The chief information security officer (CISO) role explained

BMC

Information security is a top concern for business organizations, as research finds that cyber-attacks are launched 2,244 times a day—that’s every 39 seconds. The role of Chief Information Security Officer (CISO) is gaining popularity to protect against information security risks. The average cost of a data breach is $3.9

article thumbnail

Supply Chain Cyber Security

Disaster Zone Podcast

Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com. Supply chains have been in the news for the last two years. Their vulnerability has been highlighted in many different ways during the COVID-19 Pandemic.

article thumbnail

The critical importance of creating secure passwords

Acronis

In additional recognition of last week’s Acronis’ Cyber Protection Week, this blog will touch upon passwords, and in particular, how to create secure passwords for all your accounts and keep them safe from unwanted parties.

Security 105