GDPR: Risk, opportunity and what it means for security professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
Posted: 10 May 2018 | Published: 10 May 2018
|
|
|
Essential Guide: What the EU Data Protection Regulation changes mean to you
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:
This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.
Posted: 20 Nov 2017 | Published: 20 Nov 2017
|
|
|
Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE:
In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013
|
|
|
The Business Case for Data Access Governance
sponsored by Varonis
WHITE PAPER:
This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
Posted: 01 Sep 2007 | Published: 31 Aug 2007
|
|
|
Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER:
Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013
|
|
|
The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
sponsored by Imperva
PRODUCT LITERATURE:
Read this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
Posted: 24 Jul 2007 | Published: 01 Jul 2007
|
|
|
Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER:
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008
|
|
|
5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER:
This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013
|
|
|
Big Data in Motion: Getting The Data To Where It’s Needed
sponsored by SearchSOA.com
EBOOK:
Big data is great, but how do you get it all to the analytical engines? Read this white paper to learn how to start getting big data to where it's needed.
Posted: 25 Jan 2013 | Published: 31 Dec 2012
|
|
|
System z: Making great security even better
sponsored by IBM
WHITE PAPER:
Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013
|
|
|
|
|