Infosecurity Reports

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

The difficulties of defending against web tracking
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 08 Feb 2021 | Published: 22 May 2018

TechTarget ComputerWeekly.com

December ezine: Tech for good
sponsored by MicroScope
EZINE: Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
Posted: 08 Feb 2021 | Published: 29 Nov 2018

MicroScope

Enterprises Have Room for Improvement in Secure IT Asset Disposition
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Iron Mountain

Computer Weekly – 19 April 2016: The hunters who prey on cyber criminals
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.
Posted: 18 Apr 2016 | Published: 19 Apr 2016

TechTarget ComputerWeekly.com

Sharing Security Intelligence: How to Build a Strong Network
sponsored by Hexis Cyber Solutions Inc
EGUIDE: This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

Webcast: The Newest Information Management Innovation from IBM
sponsored by IBM
WEBCAST: This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
Posted: 29 Jul 2013 | Published: 30 Jul 2013

TechTarget ComputerWeekly.com

Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM