Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Digital Forensics

RSS Feed   
Digital Forensics Reports
 
Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 20 Oct 2017 | Published: 24 Oct 2017

ComputerWeekly.com

CW Nordics ezine November 2018
sponsored by ComputerWeekly.com
EZINE: Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

ComputerWeekly.com

How SAP Customers Are Responding to the Planned 2025 End of ECC6 Mainstream Maintenance Deadline
sponsored by NetHawk Interactive
WHITE PAPER: With the 2025 deadline on SAP’s ECC6 set in stone, the debate has arisen as to whether customers should continue to run on this platform or abort. Download these survey results, which includes 5 key takeaways and shares data on what other users plan to do with this deadline in place.
Posted: 08 Nov 2019 | Published: 08 Nov 2019


CW Benelux August 2017
sponsored by ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 02 Aug 2017 | Published: 10 Aug 2017

ComputerWeekly.com

Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
Posted: 19 Jul 2019 | Published: 23 Jul 2019

ComputerWeekly.com

Digital Transformation Checklist
sponsored by Hitachi Vantara
WHITE PAPER: Leveraging data for innovative banking services only becomes useful when financial institutions know how and when to apply that data to their own services and processes. Download this 5-point digital transformation checklist to understand how you can successfully meet growing demands of customers amid all the technological and digital disruption.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

Hitachi Vantara

Capgemini’s Business Command Center: Simplify DX
sponsored by Capgemini
WEBCAST: Watch this brief video to learn about Capgemini’s Business Command Center—which can help simplify digital transformation by bringing together processes, applications, and IT in 1 single pane of glass.
Posted: 18 Dec 2019 | Premiered: Dec 18, 2019

Capgemini

Virtual currencies and their potential role in cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info