Compliance (Security) Reports

Computer Weekly - 5 November 2019: The benefits of API-first software development
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Nov 2019

TechTarget ComputerWeekly.com

Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Jun 2018

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

Sustainability: From Strategic Objective to Compliance Operation
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

HP & Intel®

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

SAP data archiving: The keys to a successful project revealed
sponsored by Dolphin
EBOOK: In this expert E-Book, find practical advice for developing an SAP data archiving strategy, and learn how this approach can help you better manage data volumes while meeting compliance and e-discovery requirements.
Posted: 05 Apr 2013 | Published: 31 Dec 2011

Dolphin

Reducing the costs and risks of data storage in the federal government
sponsored by IBM
WHITE PAPER: This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
Posted: 29 Oct 2013 | Published: 30 Jun 2012

IBM

April Essential Guide to Data Protection
sponsored by TechTarget Security
EGUIDE: In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
Posted: 10 Apr 2012 | Published: 11 Apr 2012

TechTarget Security