You've requested...

How remote work affects information governance

If a new window did not open, click here to view this asset.

Download this next:

Why IT hiring is picking up amid ongoing economic concerns

Hiring hasn’t stopped in 2023 despite fears of an economic recession; with software developers and cybersecurity specialists at the top of the list of in-demand roles.

Get an inside look into tech hiring trends in this e-guide covering insights from TechTarget’s 2023 IT Salaries and Careers Study. This study represents 524 technology professionals across North America and examines major trends in employment, staffing, salaries, perks, and DE&I (diversity, equity, and inclusion) of employees working in IT departments.

These are also closely related to: "How remote work affects information governance"

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Cloud security & IAM: Security essentials

    Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail.

    First, we’ll take a look at what cloud security frameworks are and how they improve security posture. Then, we’ll cover 10 IAM tools that are built to keep your network secure.

Find more content like what you just read:

  • Infographic: 6 information governance best practices

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • Why efficient IT asset management requires a unified, automated platform

    Discover in this e-book how ServiceNow IT Asset Management can help your organization automate the end-to-end technology asset lifecycle with a strategic workflow, and the financial benefits to which you can look forward.

    Download

  • Explore artificial intelligence in ITSM and the tool options

    Artificial intelligence in ITSM is the way of the future. Dive into this comprehensive buyer's guide to discover if you have the right conditions in place to introduce this multifaceted technology, and learn guidelines to help you choose the most suitable suite of products.

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • The Ultimate Guide to Ransomware and Cybersecurity Planning

    Read through this comprehensive e-guide for everything you need to know about cybersecurity planning for ransomware: types of attacks, common attack vectors, prevention methods and tools, best practices for recovery, and more.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • CW APAC: Expert Advice on data management

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

    Download

  • The call for data-centric security in a hybrid world

    Over 50% of organizations globally have suffered a ransomware attack that blocked access to systems or data — and more than 20% say the affected data was valuable, sensitive, or secret. With hybrid work increasingly the norm, those numbers are rising.

    Download

  • SASE vs. SD-WAN: A head-to-head capability comparison

    SASE or SD-WAN? Before your business can determine which to use to support your distributed workforce, first, you need to understand the ways in which the technologies differ. Read on to consider 5 key differences between SASE and SD-WAN.

    Download

  • Financial maturity roadmap: 4 steps for success

    Today, manufacturing and distribution companies face more pressure than ever to improve efficiency and reduce costs while still getting superior products to market quickly. However, poor technology can be the reason you don’t achieve your goals. Browse this guide to learn more.

    Download

  • Roadmap for raising & strengthening security through Identity

    Identity security was once simply a means of managing passwords and login credentials, but today, with identity at the heart of digital business, identity security is critical for protecting your organization. Download this white paper to unlock a comprehensive guide for your workforce identity maturity journey.

    Download

  • Combatting threats & attacks with AI: Trust&Safety leader’s guide

    With the average data breach costing an organization $4.35 million, it has become critical for enterprises to ensure that they’re taking the proper cybersecurity measures to mitigate threats. Browse this report to learn more.

    Download

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

    Download

  • CW ASEAN: European data law - be aware and prepare

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

    Download

  • CW APAC, July 2020: Trend Watch: Security

    In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.

    Download

  • Benefits of offensive data governance

    It’s a data-driven world. So, how can your organization succeed in it? Read this white paper to learn how, by leveraging an offensive data governance strategy, you can catalyze your business’s growth.

    Download

  • Accelerating Zero Trust Capabilities eBook

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

    Download

  • Embracing a Zero Trust strategy

    Microsoft’s Zero Trust strategy uses strong authentication, least-privilege access, and continuous monitoring to secure identities, devices, applications, data, infrastructure, and networks. To learn how Microsoft’s holistic security solutions can help your organization embrace Zero Trust, read the full white paper.

    Download

  • Analyst report: IT asset management and disposition services

    In this analyst report, you’ll discover how IT asset management and disposal services are uniquely positioned to reduce costs across the device lifecycle and enhance service delivery for end users. Read on to learn how your business can make the most of your valuable resources.

    Download

  • A global look at emerging regulatory frameworks for AI governance

    AI at scale is the end goal for many organizations. However, the uncertainty of future regulation and potential for risk - especially when it comes to Generative AI - presents challenges. This e-book unpacks how you can scale AI with ease by implementing AI governance best practices that will withstand the test of new regulations.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • IT automation: Key FAQs, how to set goals, and scaling best practices

    In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.

    Download

  • 2023 IT Priorities Study: Healthcare

    Download TechTarget’s 2023 IT Priorities Study for a look at the top technology priorities and investment plans for technology buyers across IT, business, and clinical functions.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • 3 pillars for transforming risk & compliance management

    Enterprises have to overcome the current impedances to effective risk management: organizational silos, manual work, poor UX, and disparate systems. Read this paper to understand 3 pillars for evolving your compliance and risk management strategy, as well as a checklist for how ServiceNow can assist in this process.

    Download

  • Leader’s guide to ESG: Top opportunities in 2023

    Environmental, social, and governance (ESG) mandates are top of mind for organizations everywhere. Explore this guide to 2023's top ESG opportunities, beginning with three ESG trends.

    Download

  • Data quality emerges from Covid-19 more critical than ever

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

    Download

  • How microservices take the complexity out of governance

    What if there's an easy way to reduce overhead and adapt governance for modern app architectures? In this expert e-guide, explore a distributed, microservices-based approach to governance and learn how to adapt IT for microservices and containers with automation tools.

    Download

  • Digital identity strategies to enhance data privacy and protect networks

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

    Download

  • Securing the complex, distributed enterprise

    As edge expansion, the Internet of Things (IoT), distributed (remote) workforces, and more continue to generate and consume more data, companies are put at risk of that information being siloed and compromised. Browse this white paper to learn the best ways you can keep up with the digital transformation.

    Download

  • CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

    Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.

    Download

  • Logi Options+ App Security & Privacy Whitepaper

    For organizations looking to give employees a best-in-class technology experience, they need a secure device management platform that allows for device customizations for each person. With a focus on continual optimized experiences, there is a platform that allows workers to personalize their hardware experience, securely. Read on to learn more.

    Download

  • CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance

    One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.

    Download

  • Your comprehensive guide to the Fujitsu Group

    What is the Fujitsu Way, and what does it actually look like in practice for organizations looking to promote sustainable transformation? Take a deep dive into Fujitsu’s inner workings in this comprehensive e-book.

    Download

  • 4 IT Automation Myths Dispelled

    Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.

    Download

  • Lessons in attack surface risk based on observable data

    Software as a service (SaaS) deployments and cloud migration initiatives have fueled a dramatic increase in infrastructure, too rapid to be accurately understood. To put these trends into context and provide actionable intelligence, Unit 42 analyzed several petabytes of public internet data. Download this report to unlock all their key findings.

    Download

  • Multi-cloud adoption: A double-edged sword

    Security-enabled innovation has yielded anticipated benefits for organizations, but managing costs and resources and ensuring consistent security policies pose significant challenges. In this analyst report, explore key findings and survey results to better understand the double-edged sword of multi-cloud adoption.

    Download

  • ESG analysts validate Atlassian for work management & collaboration

    As organizations make an effort to improve their work management and connected collaboration processes, it can be tricky to know which solutions and technologies are right for their needs. Browse this report to learn more.

    Download

  • CW APAC: Trend Watch - business response to coronavirus

    With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal.

    Download

  • 3 benefits of a single observability platform

    Many organizations suffer from siloed operating models when it comes to monitoring. Asian Development Bank (ADB) had a different monitoring tool for each team, resulting in data and remediation being disconnected. This white paper explains how they broke down these silos and adopted a single observability platform. Access it here.

    Download

  • Royal Holloway: Man proposes, fraud disposes

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

    Download

  • How to secure your business with the Content Cloud

    “How to secure your business with the Content Cloud” is a great overview of Box’s approach to security, governance, and compliance. Download the ebook and learn about their approach to content security, based on zero trust infrastructure, a centralized content layer in the cloud for easier management, and two other tenets.

    Download

  • HardenStance: Preparing for New Incident Reporting Requirements

    More stringent incident reporting rules, with wider scopes and broadening coverage, are becoming increasingly adopted by governments worldwide. To make these new measures as frictionless as possible, it’s important to engage proactively with local agencies and define a material incident for your organization. Download this paper to learn more.

    Download

  • Generative AI ethics: 8 biggest concerns and risks

    Generative AI is upending business models and forcing ethical issues like customer privacy, brand integrity and worker displacement to the forefront. These risks require a clearly defined strategy, good governance and a commitment to responsible AI. A corporate culture that embraces generative AI ethics must consider these eight important issues.

    Download