Bioweapons

Bioweapons Reports
The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

UKTech50 2021 - The most influential people in UK technology
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.
Posted: 20 Mar 2022 | Published: 22 Mar 2022

ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Samsung Electronics France Reduced DSO and Improved Invoice Tracking with Esker DeliveryWare
sponsored by Esker Inc.
CASE STUDY: When Samsung Electronics France needed an automated solution for processing and sending 250,000 invoices per year from its SAP solution, they chose Esker DeliveryWare. This project, carried out by Esker Certified Partner, Aegis, reduced time involved in collecting customer payments by over 10% and enabled invoice tracking.
Posted: 10 Jul 2009 | Published: 10 Jul 2009

Esker Inc.

The Massachusetts Data Protection Law
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

SearchSecurity.com & SearchCompliance.com

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM

Microsoft Dynamics: Empowered People, Simplified Processes, and Connected Ecosystems
sponsored by Microsoft
WHITE PAPER: This white paper provides an overview of how companies can use the capabilities in Microsoft® Office 2010 and Microsoft SharePoint® Server 2010 with Microsoft Dynamics to achieve these goals.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Microsoft

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave