Encryption Security Reports

Data quality emerges from Covid-19 more critical than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

How Russia's war in Ukraine is changing the cybersecurity game and why that matters
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
Posted: 18 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

Data Loss Prevention: Decision Time
sponsored by TechTarget Security
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

TechTarget Security

Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024

TechTarget ComputerWeekly.com

Mobile Device Security Best Practices for BYOD
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

TechTarget Security