Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Forensics

RSS Feed   
Forensics Reports
 
Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 20 Oct 2017 | Published: 24 Oct 2017

ComputerWeekly.com

Deloitte Tech Trends 2017
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Deloitte's annual Tech Trends report identifies the critical developments that are likely to disrupt UK and global businesses in the next 18 to 24 months
Posted: 20 Apr 2017 | Published: 20 Apr 2017

ComputerWeekly.com

CW Middle East ezine April 11 2019
sponsored by ComputerWeekly.com
EZINE: It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
Posted: 05 Apr 2019 | Published: 11 Apr 2019

ComputerWeekly.com

CW Benelux August 2017
sponsored by ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 02 Aug 2017 | Published: 10 Aug 2017

ComputerWeekly.com

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


A New Model for Healthcare Transformation
sponsored by DellEMC and Intel®
WHITE PAPER: This paper provides an overview of the major issues that are driving support for care transformation. More importantly, it outlines an approach for achieving value from the IT investments made by health care organizations in support of transformation initiatives.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement