Digital Forensics Reports

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Deloitte Global CIO Survey 2018 – UK Edition
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
Posted: 08 Feb 2021 | Published: 29 Aug 2018

TechTarget ComputerWeekly.com

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

CW APAC, March 2021: Tech career guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.
Posted: 15 Mar 2021 | Published: 04 Mar 2021

TechTarget ComputerWeekly.com

Using Case Management to Empower Employees and transform Customer Service
sponsored by Kofax, Inc.
WHITE PAPER: This white paper demonstrates how empowering your employees can lead to significantly improved customer service. Learn how dynamic case management applications can assist in delivering employee empowerment and transform the customer experience.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Kofax, Inc.

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Information Security Asean July 2015
sponsored by TechTarget
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget