ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

  • Infographic: 6 information governance best practices

    Sponsored by: TechTarget ComputerWeekly.com

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

  • Infographic: 6 file transfer best practices

    Sponsored by: TechTarget ComputerWeekly.com

    File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

  • MicroScope – May 2022: Charging at SME security challenges

    Sponsored by: MicroScope

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

  • Royal Holloway: Secure multiparty computation and its application to digital asset custody

    Sponsored by: TechTarget ComputerWeekly.com

    For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Computer Weekly - 5 April 2022: Police use of AI needs overhaul to prevent abuse

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer's guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now.

  • MicroScope – April 2022: Can life ever really be simple for partners?

    Sponsored by: MicroScope

    In this issue, discover whether simplifying programmes and interactions with partners is achievable, and what barriers stand in the way for vendors looking to make life easier. Also read about why reskilling in a post-pandemic world is key to boosting industry, and learn about what to expect from the manufacturing sphere over the next year

  • 7 NAS encryption best practices to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • 5 cybersecurity myths and how to address them

    Sponsored by: TechTarget ComputerWeekly.com

    Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.

  • Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.

  • 4 data privacy predictions for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.

  • Ransomware: The situation at the beggining of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

  • Computer Weekly - 8 March 2022: Using technology to protect human rights

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.

  • MicroScope – March 2022: Taking the steady approach to becoming an MSP

    Sponsored by: MicroScope

    In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Infographic: SIEM vs. SOAR vs. XDR

    Sponsored by: TechTarget ComputerWeekly.com

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

  • The components and objectives of privacy engineering

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • Top 10 ASEAN IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.

  • Top 10 ANZ IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

  • Infographic: Top IT predictions in APAC in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.

  • Infographic: Comparing data protection vs. data security vs. data privacy

    Sponsored by: TechTarget ComputerWeekly.com

    An organization's data is one of its most valuable assets and must be protected accordingly. Because there are so many ways data can potentially be compromised, organizations must take a multifaceted approach to ensure the well-being of their data. This means focusing on three key areas: data protection, data security and data privacy.

  • MicroScope – January 2022: Squaring up to ransomware

    Sponsored by: MicroScope

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.