IT Agents  >  

Government Agencies (non-U.S.)

RSS Feed   
Government Agencies (non-U.S.) Reports
1 - 25 of 43 Matches Previous Page  |  Next Page
The GDPR Opportunity: Data Discovery and Rights of Ownership
sponsored by Hortonworks
WHITE PAPER: Inside this white paper, learn about 2 areas of GDPR that present both obligations and opportunities - data discovery and the rights of data ownership, and 5 ways organizations can build on GDPR to increase knowledge of data under their control.
Posted: 23 May 2018 | Published: 23 May 2018

Hortonworks

In Defense of Secure, Compliant Information Sharing
sponsored by Axway
RESOURCE: Find out how the Danish Defence selected the API platform that would best fit their needs, and explore the ins and outs of deploying in a secure DMZ.
Posted: 21 May 2018 | Published: 29 Dec 2017

Axway

Computer Weekly – 15 May 2018: Will government IT be ready for Brexit?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK government struggles to get new IT systems up and running before Brexit, we examine the challenges ahead. We look at serverless computing and ask why this emerging cloud technology is so important. And we discuss the latest best practice in mobile strategy for SMEs. Read the issue now.
Posted: 11 May 2018 | Published: 11 May 2018

ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017

ComputerWeekly.com

Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

Five Essential Steps for GDPR Compliance
sponsored by Commvault
RESEARCH CONTENT: In this IDC research report, learn the 5 steps you'll need to take to get your organization into compliance with the EU's General Data Protection Regulation (GDPR) by May 2018.
Posted: 11 May 2017 | Published: 31 Mar 2017

Commvault

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Focus: IT for government and public sector
sponsored by ComputerWeekly.com
EGUIDE: It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

ComputerWeekly.com

E-government benchmark 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ComputerWeekly.com

CW500: Enterprise collaboration for a mobile workforce – Parliamentary Digital Service
sponsored by ComputerWeekly.com
PRESENTATION: Computer Weekly's CW500 Club heard from IT leaders who have introduced collaboration technology to support an increasingly mobile workforce. This presentation came from Laura Bennett, head of digital collaboration at the Parliamentary Digital Service.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

ComputerWeekly.com

Secure Voting
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

ComputerWeekly.com

The Albion Growth Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than 6O% of small to medium-sized enterprises plan to grow 'dramatically' or 'moderately' in the next two years, however IT and Telecoms companies report difficulties recruiting, this report from Albion Ventures reveals.
Posted: 27 Jan 2016 | Published: 27 Jan 2016

ComputerWeekly.com

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Building a digital government based on user needs
sponsored by ComputerWeekly.com
PRESENTATION: Liam Maxwell the government’s first chief technology officer talks about his strategy to deliver the technology that the user needs.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

ComputerWeekly.com

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Did North Korea Rob Bangladesh Bank?
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about North Korea's plausible involvement in the 2016 Bangladesh Bank theft. Discover the reasons for it, the actors behind the cyber thefts and the tools they could have used to carry out their malicious mission.
Posted: 25 Oct 2016 | Published: 22 Jun 2016

Booz Allen Hamilton

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye
1 - 25 of 43 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement