EGUIDE:
Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
EZINE:
In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
EGUIDE:
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
EGUIDE:
In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
EZINE:
In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
WHITE PAPER:
Redaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
EZINE:
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
WHITE PAPER:
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.
EGUIDE:
Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach