Data Security Research
-
Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.
-
Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
-
Computer Weekly – 6 August 2019: Using tech to boost staff morale
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
-
Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
-
The UK manufacturing sector needs a digital upgrade
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer's guide looks at enterprise social media and collaboration tools. And we find out how data science is helping to boost cyber security strategies. Read the issue now.
-
Computer Weekly – 4 June 2019: GDPR one year on – is it working?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
-
CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
Sponsored by: TechTarget ComputerWeekly.comAccording to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
CIO Trends APAC: Developing a data-driven culture
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
-
CW APAC, July 2020: Trend Watch: Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
-
CW ANZ, July 2020: Expert Advice on Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
Sponsored by: TechTarget ComputerWeekly.comCyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Royal Holloway: An enhanced approach for USB security management
Sponsored by: TechTarget ComputerWeekly.comUSB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
False cents of security: The price of being compromised
Sponsored by: TechTarget ComputerWeekly.comTrying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
-
Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
-
12 Essential Features of Advanced Endpoint Security Tools
Sponsored by: ClaranetEndpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
-
A Computer Weekly buyer’s guide to compliance, risk and governance
Sponsored by: TechTarget ComputerWeekly.comManaging data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
-
State of GDPR in mainland Europe
Sponsored by: TechTarget ComputerWeekly.comThe General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
-
Kaspersky Lab’s COVID-19 Relief Initiatives
Sponsored by: KasperskyAmid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
-
Case Study: CIO interview - Stephen Docherty on NHS data sharing
Sponsored by: TechTarget ComputerWeekly.comThe Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
-
Security Access Controls Over Identities Must Be Priority
Sponsored by: TechTarget SecurityNo company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
-
Finding a Secure Managed File Transfer Tool: Key considerations
Sponsored by: TechTarget SecurityRead this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
-
IT Security Challenges for State and Local Government IT Departments
Sponsored by: Dell TechnologiesToday's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
-
Government insists 'nothing sinister' about web user data gathering
Sponsored by: TechTarget ComputerWeekly.comPrivacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
-
Computer Weekly – 15 October 2019: Securing the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.