Security Forensics Reports

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Computer Weekly – 6 August 2019: Using tech to boost staff morale
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 06 Aug 2019

TechTarget ComputerWeekly.com

Computer Weekly – 20 June 2023: How to keep network costs affordable
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as demands for networking performance and speed increase, we examine how to keep a handle on costs. Chip makers are investing in PLC flash technology but some think it won't be worth the effort; we investigate. And we listen in as tech industry leaders and politicians discuss the regulation of AI. Read the issue now.
Posted: 19 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com

Computer Weekly – 21 March 2023: The risks of an imbalance in AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.
Posted: 17 Mar 2023 | Published: 21 Mar 2023

TechTarget ComputerWeekly.com

CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 08 Feb 2021 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon