Secure Data Reports

MicroScope – December 2023: What does the future hold for Industry 5.0?
sponsored by MicroScope
EZINE: In this issue, we explore the future of Industry 5.0 to discover whether it's truly a tech revolution or just the next step in what has been promised since Industry 4.0. Also learn more about the risks and impacts of generative AI on data compliance and compliance, as well as seven steps you should take to engage customers while providing services
Posted: 01 Dec 2023 | Published: 01 Dec 2023

MicroScope

CW APAC, July 2020: Trend Watch: Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Aug 2019

TechTarget ComputerWeekly.com

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

CW EMEA July 2023: Can we trust AI?
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

Computer Weekly – 18 July 2023: Soaring ahead with data at Rolls-Royce
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how aerospace giant Rolls-Royce uses data to improve its competitive advantage. We examine the benefits and best practices in software-defined storage. And we analyse calls for a review of laws around the use of computer evidence prompted by the Post Office IT scandal. Read the issue now.
Posted: 17 Jul 2023 | Published: 18 Jul 2023

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019

TechTarget ComputerWeekly.com

No deal Brexit: Ideal or Ordeal?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.
Posted: 08 Feb 2021 | Published: 28 Feb 2019

TechTarget ComputerWeekly.com

5 types of data security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com