Compliance (Security) Reports

Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
Posted: 21 Sep 2021 | Published: 21 Sep 2021

TechTarget ComputerWeekly.com

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett Packard Enterprise
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett Packard Enterprise

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

TechTarget ComputerWeekly.com

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Handbook: Medical Image Archiving
sponsored by TechTarget Health IT
EBOOK: As more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Health IT

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Presentation Transcript: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PRESENTATION TRANSCRIPT: This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

Aveksa

IT Handbook: Getting Over the Cloud Adoption Hurdle
sponsored by TechTarget Cloud Computing
EGUIDE: This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

TechTarget Cloud Computing

May Information Security Magazine
sponsored by TechTarget Security
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

TechTarget Security

E-Discovery:How CloudBasedStrategiesAre Changingthe World of Law
sponsored by Mimecast
EGUIDE: Download this e-guide to learn how e-discovery is conquering containerized data with comprehensive cloud-based strategies, and explore how e-discovery's existence has changed the world of law through collaboration.
Posted: 18 Dec 2018 | Published: 10 Dec 2018

Mimecast