Electronic Security Reports

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 08 Feb 2021 | Published: 02 May 2017

TechTarget ComputerWeekly.com

CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 08 Feb 2021 | Published: 13 Dec 2018

TechTarget ComputerWeekly.com

Computer Weekly – 1 October 2019: The most influential women in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
Posted: 08 Feb 2021 | Published: 01 Oct 2019

TechTarget ComputerWeekly.com

E-Guide: Align Data Protection with Business Importance
sponsored by IBM
EGUIDE: This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

May Technical Guide on PCI DSS Guidance
sponsored by TechTarget Security
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

TechTarget Security

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Mobile data protection best practices
sponsored by TechTarget Security
EGUIDE: Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

TechTarget Security

Tape Vaulting: What You Need to Know About Tape Backup and Archiving
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

Iron Mountain