Data Auditing Research
-
Data quality emerges from Covid-19 more critical than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
-
UK police unlawfully processing over a million people's data on Microsoft 365
Sponsored by: TechTarget ComputerWeekly.comThe roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
-
GDPR: Risk, opportunity and what it means for security professionals
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
-
Essential Guide: What the EU Data Protection Regulation changes mean to you
Sponsored by: TechTarget ComputerWeekly.comThis Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.
-
Jargon buster guide to GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
A Computer Weekly buyer’s guide to auditing and testing data models
Sponsored by: TechTarget ComputerWeekly.comGenerative AI has arrived on the scene with a multitude of ethical issues. In this 13-page buyer’s guide, Computer Weekly explores those considerations, assesses data classification tools and looks at how to improve test data management.
-
Data quality emerges from Covid-19 more critical than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
-
UK police unlawfully processing over a million people's data on Microsoft 365
Sponsored by: TechTarget ComputerWeekly.comThe roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
-
Tax Revenue Management and Economic Vitality
Sponsored by: IBMThis whitepaper offers essential advice for governments looking to maximize their resources while increasing their capabilities. Read on to see how analytics could be the answer, offering deeper value from your tax revenue streams.
-
5 Ways Hosting Providers Prepare Clients for PCI 3.0
Sponsored by: INetU Inc.This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
-
Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
Sponsored by: Iron MountainExplore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
-
Setting the Stage for the Data Governance: A CIO's Guide
Sponsored by: IBMIn this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
-
System z: Making great security even better
Sponsored by: IBMAdopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
-
CW Buyer's Guide: Big Data Infrastructure
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
-
Big Data in Motion: Getting The Data To Where It’s Needed
Sponsored by: TechTarget App ArchitectureBig data is great, but how do you get it all to the analytical engines? Read this white paper to learn how to start getting big data to where it's needed.
-
Under Armour Improves Performance of SAP Data Loading with Winshuttle
Sponsored by: Winshuttle, LLCWinshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention.
-
Stopping data leakage: Exploiting your existing security investment
Sponsored by: SophosThis paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
-
The Business Case for Data Access Governance
Sponsored by: VaronisThis white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
-
DatAdvantage: Comprehensive Data Governance
Sponsored by: VaronisThis paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
-
DataPrivilege: Entitlement Management Where It Belongs - With Business Owners
Sponsored by: VaronisIn most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ...
-
The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
Sponsored by: ImpervaRead this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
-
Mobile Data Security Essentials for Your Changing, Growing Workforce
Sponsored by: CREDANT TechnologiesDownload this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
-
AppDetective
Sponsored by: Application Security, Inc.Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.