Compliance (Security) Reports

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019

TechTarget ComputerWeekly.com

Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
Posted: 21 Sep 2021 | Published: 21 Sep 2021

TechTarget ComputerWeekly.com

New Data Center Designs Go Underground for Energy Efficiency
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a service that's changing the data center colocation model by delivering the key capabilities and functions you need to align your data center infrastructure with disaster recovery requirements and fuel success.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

TechTarget ComputerWeekly.com

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

April Essential Guide to Data Protection
sponsored by TechTarget Security
EGUIDE: In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
Posted: 10 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 15 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

The changing SIEM landscape: What you should know to stay ahead
sponsored by TechTarget Security
EGUIDE: While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

TechTarget Security