You've requested...

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends

If a new window did not open, click here to view this asset.

Download this next:

Essential Guide: What the EU Data Protection Regulation changes mean to you

With the new European Data Protection Regulation on the way you will need to keep up to date on the intricacies of the new data protection law.

This guide offers you news, tips and features on the new regulation and how it may affect you and your organisation.

These are also closely related to: "Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends"

  • Data protection in the age of Brexit and GDPR

    Discussions around data protection continue to be dominated by Brexit and the GDPR. And even as the GDPR is driving data protection maturity internationally, many companies are still playing catch-up.  

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity, with insight into why many firms still stuck in the GDPR prep phase after its initiation.

    Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation. 

  • Your GDPR guide

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Fortunately, the need to comply with the General Data Protection Regulation (GDPR) from 25 May 2018 and planned UK legislation designed to align perfectly with the GDPR is likely to drive most companies handling EU citizens’ data to reassess their data protection capabilities, particularly in relation to personal data.

    However, the need for every business to pay attention to data protection is underlined by the fact that data breaches have been shown to have a direct correlation to falls in share prices, sometimes wiping off tens of millions from the market value. 

    Data protection is not only important from a compliance and business value protection point of view, it is also key to fostering the digital economy and gaining a competitive edge, according to UK information commissioner Elizabeth Denham.

    Failure to protect and handle data correctly can also result in punitive actions for companies participating in the digital economy, as Google found out recently when a consumer protection organisation in Denmark asked the government to investigate allegations that Google is breaking privacy laws by not limiting how long it stores personal data.

    As companies move increasingly into the cloud, it is important that they adapt their data protection strategies accordingly, but at the same time, experts say enterprises should not forget tape storage when it comes to data protection, nor should they overlook cloud storage because of the agility it affords.

    However, before launching into cloud-based storage, there are several key questions organisations need to ask to ensure that a cloud-based data storage and protection strategy is right for them.  

Find more content like what you just read:

  • Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief

    In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.

    Download

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

    Download

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download

  • Top 10 IT in the Nordics stories of 2019

    The Nordic region punches above its weight in IT terms, with a rich tech ecosystem that ranges from clusters of tech startups creating the latest apps to large in-house IT teams transforming traditional industries. Here are Computer Weekly's top 10 Nordic enterprise IT stories of 2019.

    Download

  • 4 key takeaways from the state of compliance

    The geopolitical landscape has exacerbated cyberattacks, leading to an imminent influx of regulatory change. In this report, experts from Firebrand research explore the state of regulatory requirements and how the current landscape is driving an increased need for compliance. Read on to learn more.

    Download

  • 10 benefits of AI-powered identity compliance

    Meeting and maintaining compliance entails high volumes of work, often comprised of tedious, repetitive and redundant tasks. With AI you can meet compliance, secure identities, and save resources by automating these tasks. Read this e-book to learn more.

    Download

  • Identity security: Transforming how organizations meet regulatory compliance

    Meeting regulatory compliance is a complex challenge that can introduce further challenges into already difficult business. SailPoint AI-driven identity security ensures authorized access to sensitive data, allowing for an easier compliance process through the following benefits. Read on to learn more.

    Download

  • Compliance risk map: Learn how EED will impact your organization

    Download this exclusive infographic for the EED compliance risk heat map, and find out how your business may be affected.

    Download

  • HardenStance: Preparing for New Incident Reporting Requirements

    More stringent incident reporting rules, with wider scopes and broadening coverage, are becoming increasingly adopted by governments worldwide. To make these new measures as frictionless as possible, it’s important to engage proactively with local agencies and define a material incident for your organization. Download this paper to learn more.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • Guiding Your Leadership Team Through the Zero Trust Mindset

    Zero trust identifies users and entities and grants them just the right amount of access as needed. In this e-book, LATAM Field Technology Director at CyberArk, Cláudio Neiva, leverages his 24 years of experience to break down the essential elements of zero trust. Read on to learn more.

    Download

  • Security audits: How to prep for a more successful experience

    In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.

    Download