Data Security Research
-
A Computer Weekly Buyer's Guide to Customer Experience
Sponsored by: TechTarget ComputerWeekly.comDiscover how to craft data-first CRM strategies and get tips about coordinating data sources for effective CRM, 5 ways to reduce risks for Salesforce deployments, and the pros and cons of current CRM software offerings.
-
CW Benelux August 2017
Sponsored by: TechTarget ComputerWeekly.comThe Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
-
Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
-
Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
-
Computer Weekly – 9 May 2017: Casting the IT skills net wider
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
Computer Weekly – 2 May 2017: How to deal with data under GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
-
The currency of trust: why banks and insurers must make customer data safer and more secure
Sponsored by: TechTarget ComputerWeekly.comBanks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
-
Data protection: Not just about personal data and compliance
Sponsored by: TechTarget ComputerWeekly.comDespite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
-
Jargon buster guide to GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
CW Europe – March 2017
Sponsored by: TechTarget ComputerWeekly.comTechnology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.
-
Are we trusting social networks too much?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Are you one eDiscovery away from a budgetary meltdown?
Sponsored by: TechTarget ComputerWeekly.comUsing an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.
-
Protecting your organisation from itself
Sponsored by: TechTarget ComputerWeekly.comThis report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
-
CW Europe: December 2016 - February 2017
Sponsored by: TechTarget ComputerWeekly.comSecurity continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
-
EU data protection: Essential guide
Sponsored by: TechTarget ComputerWeekly.comThe European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
-
Computer Weekly – 8 November 2016: The march of the robot workers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
-
Policing cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
-
Computer Weekly – Dell Technologies aims for an intelligent, connected future
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.
-
Computer Weekly – 30 August 2016: Get protected
Sponsored by: TechTarget ComputerWeekly.comIt is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
-
Extracting actionable data from banking malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
-
Computer Weekly – 2 August 2016: Giving fashion a digital makeover
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.
-
A Security Assessment of Android Full-disk Encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
Cloud computing storage key management
Sponsored by: TechTarget ComputerWeekly.comJagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
Secure Voting
Sponsored by: TechTarget ComputerWeekly.comThis report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.