Searching all of TechTarget| 3,589 results for "persistent"

SearchVirtualStorage

By Brian Madden Evaluate Nov 19, 2014

When should persistent VDI be used over non-persistent VDI?

VDI expert Brian Madden explains why most of today's storage options can handle persistent desktops, and how non-persistence can contribute to VDI failure. Continue Reading

SearchSecurity

Manage Apr 07, 2015

Beyond the Page: Advanced Persistent Threats, Ransomware and More

The era of mobile, cloud and the Internet of Things is also an era of advanced persistent threats, ransomware and more. Here's how to stay secure. Continue Reading

SearchFinancialSecurity

By Maxim Tamarov News Mar 12, 2015

Banking Trojans decline, but financial malware threat persists

A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms. Continue Reading

ComputerWeekly

Mar 12, 2015

Mac OS X persistent evidences for forensic purposes

This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation. Continue Reading

SearchVirtualStorage

Get Started Feb 26, 2015

Madden: Non-persistent VDI is getting easier

Brian Madden was once a stark proponent of persistent VDI, but he says that opinion is changing thanks to improvements in technology and the way users are accessing applications. Continue Reading

SearchSecurity

By Michael Cobb Manage Apr 28, 2015

Are mobile persistent cookies a threat to enterprise data security?

While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to mitigate the risk and eliminate the threat. Continue Reading

SearchSecurity

By Michael Heller News Apr 24, 2015

Long-duration advanced persistent threat attacks now the norm, say experts

Threat experts at RSA Conference 2015 say today's most dangerous attack techniques reflect a shift toward long-duration attacks that are often nearly impossible to detect. Continue Reading

SearchServerVirtualization

By Jim O'Reilly Evaluate Jan 21, 2015

Myths persist about virtualizing high performance computers

Recent evidence shows virtualization is a viable option for high performance computers today. Continue Reading

SearchSecurity

By Nick Lewis Evaluate Apr 14, 2015

Advanced persistent threat detection: Can it find custom malware?

Signature-based antimalware tools can't always detect custom malware and advanced persistent threats. Expert Nick Lewis explains how to combat these menaces. Continue Reading

TheServerSide

Evaluate Mar 09, 2015

What we can expect from Hibernate OGM and data persistence in 2015

Emmanuel Bernard discusses the Hibernate OGM project and how it has progressed since it was initially envisioned back in 2011. Continue Reading