Regulatory Compliance Research
-
CW EMEA - January 2023: Protecting the privacy of schoolchildren
Sponsored by: TechTarget ComputerWeekly.comIn this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
-
Computer Weekly – 15 November 2022: How to protect against ransomware attacks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.
-
MITRE ATT&CK, a guide for businesses in 2022
Sponsored by: TechTarget ComputerWeekly.comMitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
-
Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
-
Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.
-
Computer Weekly - 5 November 2019: The benefits of API-first software development
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
-
Computer Weekly – 15 October 2019: Securing the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
-
Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.
-
GDPR: Risk, opportunity and what it means for security professionals
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
-
MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate
Sponsored by: MicroScopeAn e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.
-
Focus ASEAN: Analytics & data-driven insights
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, learn how Singapore's central bank as well as universities and research facilities are driving the adoption of analytics and data science, and how SAS is prepping its marketers for the data flood.
-
Focus: Analytics & data-driven insights
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, learn about the state of adoption of data analytics in Australia, how Commonwealth Bank is making analytics tools more accessible to small companies and how SAS is prepping its marketers for the data flood.
-
Computer Weekly – 15 October 2019: Securing the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
-
E-Discovery:How CloudBasedStrategiesAre Changingthe World of Law
Sponsored by: MimecastDownload this e-guide to learn how e-discovery is conquering containerized data with comprehensive cloud-based strategies, and explore how e-discovery's existence has changed the world of law through collaboration.
-
GDPR Developments Will Dominate Storage and Compliance in 2017
Sponsored by: Arrow + NetAppIn this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
-
Records Management Strategies to Maintain Regulatory Compliance
Sponsored by: TechTarget SecurityData governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
-
Computer Weekly – 25 August 2015: Coping with a crisis
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
-
Records Management Strategies to Maintain Regulatory Compliance
Sponsored by: TechTarget SecurityData governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
Protecting Your Critical Data with Integrated Security Intelligence
Sponsored by: IBMAccess this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Security Intelligence Is the Smart Way to Keep the Cloud Safe
Sponsored by: IBMFind out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.