Online Privacy Reports

CIO Trends APAC: Developing a data-driven culture
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
Posted: 08 Feb 2021 | Published: 13 Jul 2020

TechTarget ComputerWeekly.com

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 May 2020

TechTarget ComputerWeekly.com

Marketing analytics, big data and ethics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we discuss the how important respecting the data privacy of customers and prospective customers is for companies trying to make a profit.  For commercial organisations, finding this ethical balance between making money from data and safeguarding the privacy of personal data is more important than ever thanks to the EU's GDPR.
Posted: 08 Feb 2021 | Published: 03 Apr 2018

TechTarget ComputerWeekly.com

Data protection, a live issue that affects us all
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
Posted: 08 Feb 2021 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com

Infographic: 5 ways backup can protect against ransomware
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. This infographic looks at the top 5 steps CIOs should consider.
Posted: 05 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
Posted: 08 Feb 2021 | Published: 23 Jul 2019

TechTarget ComputerWeekly.com

Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by TechTarget Security
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

TechTarget Security

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine