Web Privacy Reports

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by TechTarget ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 08 Feb 2021 | Published: 14 Mar 2019

TechTarget ComputerWeekly.com

CIO Trends #10: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

Declaration by David Godkin with 218 exhibits – 17 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

De-risking IT Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

TechTarget ComputerWeekly.com

The Mobile Trust Gap
sponsored by MobileIron
WHITE PAPER: This important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

MobileIron

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

A Computer Weekly buyer’s guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

TechTarget ComputerWeekly.com

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM