Forensics Reports

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

Computer Weekly – 6 August 2019: Using tech to boost staff morale
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 06 Aug 2019

TechTarget ComputerWeekly.com

CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 08 Feb 2021 | Published: 13 Dec 2018

TechTarget ComputerWeekly.com

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

ERP Software Selection Criteria for Midsized Businesses
sponsored by Sage Software
EGUIDE: In this E-Guide, you will gain practical advice and best practices for choosing an ERP system from Jim Shepherd, senior vice president of research for AMR Research.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Sage Software

Business Software Management: Best Practices for Ongoing Success
sponsored by More Direct
EGUIDE: This e-guide from SearchCIO.com highlights the baseline requirements that must be met by business software in order to deliver the higher-level services and information that help businesses thrive.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

More Direct