Bioweapons Reports

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Guide to Flexible Working
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 08 Feb 2021 | Published: 07 Apr 2016

TechTarget ComputerWeekly.com

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by TechTarget ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 08 Feb 2021 | Published: 14 Mar 2019

TechTarget ComputerWeekly.com

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

The Performance Manager: Turning Information Into Higher Business Performance
sponsored by IBM
WHITE PAPER: Download this white paper for an extensive summary of The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, a book that examines the partnership between decision-makers and the people who provide them with information to drive better decisions.
Posted: 20 Jul 2009 | Published: 14 Feb 2008

IBM

Computer Weekly – 16 January 2024: All eyes are on the Post Office scandal – at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.
Posted: 12 Jan 2024 | Published: 16 Jan 2024

TechTarget ComputerWeekly.com

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

TechTarget ComputerWeekly.com

A New Model for Healthcare Transformation
sponsored by DellEMC and Intel®
WHITE PAPER: This paper provides an overview of the major issues that are driving support for care transformation. More importantly, it outlines an approach for achieving value from the IT investments made by health care organizations in support of transformation initiatives.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

CW Europe – September Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

TechTarget ComputerWeekly.com