Trustmarks Reports

Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017

TechTarget ComputerWeekly.com

Europe's controversial digital vision for the next decade
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 08 Feb 2021 | Published: 16 Jun 2020

TechTarget ComputerWeekly.com

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by TechTarget ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 08 Feb 2021 | Published: 14 Mar 2019

TechTarget ComputerWeekly.com

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

Infographic: 5 ways backup can protect against ransomware
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. This infographic looks at the top 5 steps CIOs should consider.
Posted: 05 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by TechTarget Security
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

TechTarget Security

The Mobile Trust Gap
sponsored by MobileIron
WHITE PAPER: This important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

MobileIron

Government insists 'nothing sinister' about web user data gathering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.
Posted: 31 Mar 2014 | Published: 01 Apr 2014

TechTarget ComputerWeekly.com