Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Forensic Analysis

RSS Feed   
Forensic Analysis Reports
 
Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

CW Middle East July to Sept 2017
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Middle East, we find out why the Gulf region must do more to attract women into IT if the region’s countries are to diversify.
Posted: 06 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

Understanding Your Needs for BPM and aPaaS
sponsored by Mendix
WHITE PAPER: Download this BPM guide which outlines both primary use case integrations and possible barriers that could be resolved with an aPaaS tool.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Mendix

Computer Weekly – 9 January 2018: Countdown to GDPR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

ComputerWeekly.com

Deloitte Global CIO Survey 2018 – UK Edition
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

ComputerWeekly.com

Next Generation Platform for IT Automation & Orchestration
sponsored by Ayehu
WHITE PAPER: Businesses like IBM, CVS, and GE have all made IT automation a priority – but how exactly have they implemented it within their IT operations? Download this whitepaper for a look into Ayehu, the automation platform these global brands use to automate tasks to become more efficient.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Ayehu

Intelligent Inventory: How to Solve the Classic Manufacturing Dilemma
sponsored by Sage Software
WHITE PAPER: Use this manufacturer’s inventory management guide, which explores how to address 6 common inventory challenges through the support of IoT and AI systems of innovation.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Sage Software

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement