DG Reports

Risk management is the beating heart of your cyber strategy
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

10 steps to building a data catalog
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.
Posted: 29 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

No deal Brexit: Ideal or Ordeal?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.
Posted: 08 Feb 2021 | Published: 28 Feb 2019

TechTarget ComputerWeekly.com

CW APAC - January 2021: Trend Watch - CIO trends
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly reviews some key IT trends that are likely to shape the industry in 2021.
Posted: 08 Feb 2021 | Published: 21 Jan 2021

TechTarget ComputerWeekly.com

Infographic: 6 information governance best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 08 Feb 2021 | Published: 18 Jul 2019

TechTarget ComputerWeekly.com

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 08 Feb 2021 | Published: 02 May 2017

TechTarget ComputerWeekly.com

Good Data Governance Programs: Why the Urgency?
sponsored by TechTarget Data Management
EZINE: Companies aren't gaining enough value from big data. That's why there's a greater need to establish data handling policies and procedures that only good data governance programs can provide. Explore good use vs. abuse of customer data (Wells Fargo, Target, and Bank of America), 4 data governance concerns and best practices, and much more.
Posted: 13 Jun 2017 | Published: 06 Jun 2017

TechTarget Data Management

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella