ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Focus: Datacentre Uptime

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime.

  • CW Europe – September-November 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.

  • CW Nordics August 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

  • A Computer Weekly Buyer's Guide to Customer Experience

    Sponsored by: TechTarget ComputerWeekly.com

    Discover how to craft data-first CRM strategies and get tips about coordinating data sources for effective CRM, 5 ways to reduce risks for Salesforce deployments, and the pros and cons of current CRM software offerings.

  • CW Benelux August 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

  • Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: TechTarget ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Jargon buster guide to GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • CW Europe – March 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

  • Are we trusting social networks too much?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: TechTarget ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • Protecting your organisation from itself

    Sponsored by: TechTarget ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • CW Europe: December 2016 - February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • EU data protection: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

  • Computer Weekly – 8 November 2016: The march of the robot workers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • Policing cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • Computer Weekly – Dell Technologies aims for an intelligent, connected future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: TechTarget ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Extracting actionable data from banking malware

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

  • Computer Weekly – 2 August 2016: Giving fashion a digital makeover

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.