Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Internet Piracy

RSS Feed   
Internet Piracy Reports
 
The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

ComputerWeekly.com

Top 10 startup stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: A persistent theme in this year's Computer Weekly startup coverage was collaboration, but this time with a particular emphasis on building ecosystems. Across Europe, startups have been pushing to build collaborative ecosystems in both the public and private sector alongside their partners. Here are Computer Weekly's top 10 startup stories of 2019.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

ComputerWeekly.com

How to Build a Strong Business Case for Your Supply Chain Technology Investment
sponsored by GIB
WHITE PAPER: Download this guide which provides 9 ways for you to evaluate and pitch the benefits of a potential supply chain tech investment to your decision stakeholders.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

GIB

Norton Cyber Security Insights Report – UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

Policing cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 23 Sep 2016 | Published: 23 Sep 2016

ComputerWeekly.com

How to Survive a Bank Robbery
sponsored by Splunk
WHITE PAPER: Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Splunk

The Critical Role of Maintenance and Repair Data for Manufacturers
sponsored by Hitachi Vantara
WHITE PAPER: With the digitization of factories, a wide volume of data has become available, which creates new opportunities for enterprises to efficiently monitor and repair assets. Use this industrial IoT white paper, which explores the financial impacts of applying insights from operational IIoT data to physical maintenance processes.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Hitachi Vantara

Computer Weekly – 9 January 2018: Countdown to GDPR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info