ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.

  • How Google Workspace helps protect your organization

    Sponsored by: Google Workspace

    The way we work has changed – organizations are creating more data than ever before and looking to store it in the cloud for easy access, creating new security challenges that legacy collaboration tools can’t handle. Read this white paper to learn how to keep your business safer with a zero-trust security model designed for collaboration.

  • 4 data privacy predictions for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.

  • Ransomware: The situation at the beggining of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

  • Computer Weekly - 8 March 2022: Using technology to protect human rights

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.

  • MicroScope – March 2022: Taking the steady approach to becoming an MSP

    Sponsored by: MicroScope

    In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages

  • A Computer Weekly buyer's guide to data integration

    Sponsored by: TechTarget ComputerWeekly.com

    Data integration is increasing in importance for businesses. In this 17-page buyer's guide, Computer Weekly looks at its complex nature, four key trends to assess, which approaches to take when linking IT systems and why Nasa's Ron Thompson regards data as so important.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Infographic: SIEM vs. SOAR vs. XDR

    Sponsored by: TechTarget ComputerWeekly.com

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

  • The components and objectives of privacy engineering

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • Top 10 ASEAN IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.

  • Top 10 ANZ IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.

  • Making Sense of Sensitive Data

    Sponsored by: PKWare

    In this white paper, read how PKWARE’s PK Protect offers data discovery and protection that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment.

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

  • Infographic: Top IT predictions in APAC in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.

  • Infographic: Comparing data protection vs. data security vs. data privacy

    Sponsored by: TechTarget ComputerWeekly.com

    An organization's data is one of its most valuable assets and must be protected accordingly. Because there are so many ways data can potentially be compromised, organizations must take a multifaceted approach to ensure the well-being of their data. This means focusing on three key areas: data protection, data security and data privacy.

  • MicroScope – January 2022: Squaring up to ransomware

    Sponsored by: MicroScope

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

  • CW APAC, December 2021: Expert guide to cloud migration

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at the key considerations and strategies that enterprises can take when moving their workloads to public cloud

  • Spotlight on Emerging Ransomware Threats

    Sponsored by: Commvault

    Giving into ransom demands may not only lead to more ransomware attacks, but also more sophisticated ones. Paying those demands has the potential to create a false sense of security, unintended consequences and future liabilities. Tap into this e-guide to learn about current & emerging threats, best practices, and the negation process.

  • Computer Weekly - 2 November 2021: What the Budget means for UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look through the chancellor's Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO's experiences of learning the privacy lessons of GDPR. Read the issue now.

  • Computer Weekly - 21 September 2021: The cities planning for ethical use of AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.

  • Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

  • Computer Weekly - 10 August 2021: Real-time data analytics in action

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.