Security Forensics Reports

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by TechTarget ComputerWeekly.com
EZINE: Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 08 Feb 2021 | Published: 27 Feb 2020

TechTarget ComputerWeekly.com

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.
Posted: 31 Aug 2021 | Published: 09 Sep 2021

TechTarget ComputerWeekly.com

The gender pay gap
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.
Posted: 08 Feb 2021 | Published: 26 Apr 2017

TechTarget ComputerWeekly.com

Computer Weekly – 22 May 2018: GDPR is here – are you ready?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the EU's new GDPR rules come into force this week – we ask if companies are ready and look at what happens if you're not compliant. Our latest buyer's guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 May 2018

TechTarget ComputerWeekly.com

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Nov 2016

TechTarget ComputerWeekly.com

Transforming Healthcare Delivery with Analytics
sponsored by IBM
WHITE PAPER: In this white paper, learn how data mining and statistical analysis can dramatically improve patient care and satisfaction without stretching your budget.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

IBM

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro