Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Cyberforensics

RSS Feed    Add to Google    Add to My Yahoo!
CyberforensicsReports
 
Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

MarketScope for E-Discovery Software Product Vendors
sponsored by Clearwell Systems
WHITE PAPER: Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs.
Posted: 18 Nov 2010 | Published: 21 Dec 2009

Clearwell Systems

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

CW Europe – September Edition
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

ComputerWeekly.com

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement