Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Security Forensics

RSS Feed   
Security Forensics Reports
 
Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

The Critical Role of Maintenance and Repair Data for Manufacturers
sponsored by Hitachi Vantara
WHITE PAPER: With the digitization of factories, a wide volume of data has become available, which creates new opportunities for enterprises to efficiently monitor and repair assets. Use this industrial IoT white paper, which explores the financial impacts of applying insights from operational IIoT data to physical maintenance processes.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Hitachi Vantara

Guide to Flexible Working
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

ComputerWeekly.com

Deloitte Global CIO Survey 2018 – UK Edition
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

ComputerWeekly.com

Virtual currencies and their potential role in cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

Evaluation Guide for AIOps
sponsored by Moogsoft
WHITE PAPER: While most businesses understand AI will become foundational in efficient IT operations, many businesses struggle with evaluating the benefits, features, and methods of implementation. Download this AIOps evaluation guide to understand how you can leverage AI, clarify the IT and business benefits.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Moogsoft

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info