CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 08 Feb 2021 | Published: 10 Aug 2017
|
|
|
Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
Posted: 08 Feb 2021 | Published: 13 Jun 2017
|
|
|
Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 May 2017
|
|
|
The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017
|
|
|
Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 08 Feb 2021 | Published: 02 May 2017
|
|
|
Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017
|
|
|
The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017
|
|
|
Data protection: Not just about personal data and compliance
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 08 Feb 2021 | Published: 18 Apr 2017
|
|
|
Jargon buster guide to GDPR
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
CW Europe – March 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.
Posted: 08 Feb 2021 | Published: 09 Mar 2017
|
|
|
Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017
|
|
|
Are you one eDiscovery away from a budgetary meltdown?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.
Posted: 08 Feb 2021 | Published: 25 Jan 2017
|
|
|
Protecting your organisation from itself
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
Posted: 08 Feb 2021 | Published: 06 Jan 2017
|
|
|
CW Europe: December 2016 - February 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 08 Feb 2021 | Published: 15 Dec 2016
|
|
|
EU data protection: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
Posted: 08 Feb 2021 | Published: 24 Nov 2016
|
|
|
Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Nov 2016
|
|
|
Policing cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 08 Feb 2021 | Published: 23 Sep 2016
|
|
|
Computer Weekly – Dell Technologies aims for an intelligent, connected future
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Sep 2016
|
|
|
Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE:
It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016
|
|
|
Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016
|
|
|
A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
Computer Weekly – 2 August 2016: Giving fashion a digital makeover
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success
sponsored by Dell and VMware
WHITE PAPER:
Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.
Posted: 10 Mar 2011 | Published: 10 Mar 2011
|
|