Searching all of TechTarget| 3,651 results for "persistent"


By Brad Irby Get Started Aug 14, 2015

What is the best pattern to use for data persistence?

When designing an application, developers must decide how to implement data persistence. Brad Irby explains which data persistence pattern to consider. Continue Reading


By Brian Madden Evaluate Nov 19, 2014

When should persistent VDI be used over non-persistent VDI?

VDI expert Brian Madden explains why most of today's storage options can handle persistent desktops, and how non-persistence can contribute to VDI failure. Continue Reading


By Johannes Ullrich Manage Apr 07, 2015

Beyond the Page: Advanced Persistent Threats, Ransomware and More

The era of mobile, cloud and the Internet of Things is also an era of advanced persistent threats, ransomware and more. Here's how to stay secure. Continue Reading


By Maxim Tamarov News Mar 12, 2015

Banking Trojans decline, but financial malware threat persists

A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms. Continue Reading


Mar 12, 2015

Mac OS X persistent evidences for forensic purposes

This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation. Continue Reading


Get Started Feb 26, 2015

Madden: Non-persistent VDI is getting easier

Brian Madden was once a stark proponent of persistent VDI, but he says that opinion is changing thanks to improvements in technology and the way users are accessing applications. Continue Reading


By Jim O'Reilly Evaluate Jan 21, 2015

Myths persist about virtualizing high performance computers

Recent evidence shows virtualization is a viable option for high performance computers today. Continue Reading


By Michael Cobb Manage Apr 28, 2015

Are mobile persistent cookies a threat to enterprise data security?

While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to mitigate the risk and eliminate the threat. Continue Reading


By Michael Heller News Apr 24, 2015

Long-duration advanced persistent threat attacks now the norm, say experts

Threat experts at RSA Conference 2015 say today's most dangerous attack techniques reflect a shift toward long-duration attacks that are often nearly impossible to detect. Continue Reading


By Nick Lewis Evaluate Apr 14, 2015

Advanced persistent threat detection: Can it find custom malware?

Signature-based antimalware tools can't always detect custom malware and advanced persistent threats. Expert Nick Lewis explains how to combat these menaces. Continue Reading