Cyberforensics Reports

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by TechTarget ComputerWeekly.com
EZINE: Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 08 Feb 2021 | Published: 27 Feb 2020

TechTarget ComputerWeekly.com

IT Priorities 2021 - European Budgets Infographic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: After surveying near 500 European IT sector professionals, the jury is out on what companies across the continent will be spending on in 2021. We dive into what spend will be easier to justify, if budgets for IT companies are on the rise or fall and what the 2021 project rankings are for most in the new year.
Posted: 08 Feb 2021 | Published: 14 Dec 2020

TechTarget ComputerWeekly.com

Computer Weekly – 6 August 2019: Using tech to boost staff morale
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 06 Aug 2019

TechTarget ComputerWeekly.com

Virtual and Superior: How to Build Teams that Get Things Done
sponsored by Citrix
WHITE PAPER: This white paper highlights tips and best practices for CIOs looking for more effective ways to cut risk and create value in virtual environments through better teamwork.
Posted: 12 Sep 2012 | Published: 12 Sep 2012

Citrix

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

Business Software Management: Best Practices for Ongoing Success
sponsored by More Direct
EGUIDE: This e-guide from SearchCIO.com highlights the baseline requirements that must be met by business software in order to deliver the higher-level services and information that help businesses thrive.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

More Direct

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise