ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption White Papers

  • Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

  • Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.

  • 2 types of endpoint encryption to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • 7 NAS encryption best practices to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • Executive Interview: Unleashing blockchain's potential

    Sponsored by: TechTarget ComputerWeekly.com

    Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Royal Holloway: An enhanced approach for USB security management

    Sponsored by: TechTarget ComputerWeekly.com

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

  • Computer Weekly – 6 August 2019: Using tech to boost staff morale

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

  • CW Europe – December 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Jargon buster guide to GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Managing Android devices in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

  • Cloud computing storage key management

    Sponsored by: TechTarget ComputerWeekly.com

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

  • Presentation Transcript: Endpoint security fundamentals

    Sponsored by: Sophos

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • The Massachusetts Data Protection Law

    Sponsored by: TechTarget Security

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • Presentation Transcript: Changing the Economics of Storage Infrastructure with Virtualization

    Sponsored by: LSI and presented by HP

    In these hard economic times, so much information is already out there about how to bring down the costs of storage infrastructures, but none of them describe how the design of a flexible and agile (adaptive) infrastructure actually facilitates these potential savings.

  • Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives

    Sponsored by: TechTarget Search Windows Server

    In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.