ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Research

  • Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

  • Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.

  • 2 types of endpoint encryption to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • 7 NAS encryption best practices to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • Executive Interview: Unleashing blockchain's potential

    Sponsored by: TechTarget ComputerWeekly.com

    Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Royal Holloway: An enhanced approach for USB security management

    Sponsored by: TechTarget ComputerWeekly.com

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

  • Computer Weekly – 6 August 2019: Using tech to boost staff morale

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

  • CW Europe – December 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Jargon buster guide to GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Managing Android devices in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

  • Cloud computing storage key management

    Sponsored by: TechTarget ComputerWeekly.com

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Cloud-based backup services are a safety net in tricky times

    Sponsored by: TechTarget Data Backup

    Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.