Data Encryption White Papers
-
Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
-
2 types of endpoint encryption to protect data
Sponsored by: TechTarget ComputerWeekly.comEndpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
-
How Russia's war in Ukraine is changing the cybersecurity game and why that matters
Sponsored by: TechTarget ComputerWeekly.comThe build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
-
7 NAS encryption best practices to protect data
Sponsored by: TechTarget ComputerWeekly.comNAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
-
Executive Interview: Unleashing blockchain's potential
Sponsored by: TechTarget ComputerWeekly.comLabrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
-
Data quality emerges from Covid-19 more critical than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
Computer Weekly – 1 October 2019: The most influential women in UK technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
-
Computer Weekly – 6 August 2019: Using tech to boost staff morale
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Royal Holloway: An enhanced approach for USB security management
Sponsored by: TechTarget ComputerWeekly.comUSB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
CW APAC, June 2020: Trend Watch - data protection
Sponsored by: TechTarget ComputerWeekly.comAsia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
-
CW Europe – December 2018
Sponsored by: TechTarget ComputerWeekly.comDutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
Computer Weekly – 9 May 2017: Casting the IT skills net wider
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
-
Computer Weekly – 2 May 2017: How to deal with data under GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
-
Data protection: Not just about personal data and compliance
Sponsored by: TechTarget ComputerWeekly.comDespite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
-
Jargon buster guide to GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
Trouble at your door: targeted cyber attacks in the UK and Europe
Sponsored by: TechTarget ComputerWeekly.comThis research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
-
Data quality emerges from Covid-19 more critical than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
-
CW APAC, June 2020: Trend Watch - data protection
Sponsored by: TechTarget ComputerWeekly.comAsia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
-
Cloud-based backup services are a safety net in tricky times
Sponsored by: TechTarget Data BackupUse this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.
-
GDPR Developments Will Dominate Storage and Compliance in 2017
Sponsored by: Arrow + NetAppIn this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
-
Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
Sponsored by: NerdioFinding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
-
Five Windows 10 security risks that are easy to overlook
Sponsored by: vmware airwatchAs more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.