Government Regulations Reports

Computer Weekly – 4 July 2023: How data is beating heart disease
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.
Posted: 30 Jun 2023 | Published: 04 Jul 2023

TechTarget ComputerWeekly.com

Pervasive Data Profiler v4
sponsored by Pervasive Integration
PRODUCT DEMO: Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data
Posted: 11 Jan 2008 | Premiered: 11 Jan 2008

Pervasive Integration

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

Computer Weekly – 25 June 2013: Big data in action at Channel 4
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Channel 4, an early adopter of cloud-based big data analytics, about how the technology helps audience engagement. We examine the challenges for IT departments as business leaders take over the move to digital. And we examine users' experiences of adopting cloud applications. Read the issue now.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

TechTarget ComputerWeekly.com

NERC: What You Need to Know
sponsored by TechTarget Security
EBOOK: The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

TechTarget Security

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Assuring Asset Documentation Integrity
sponsored by McLaren Software
WHITE PAPER: In this whitepaper, we will discuss best practices for assuring the integrity of your asset documentation.
Posted: 01 Feb 2008 | Published: 01 Jul 2007

McLaren Software

Records Management Strategies to Maintain Regulatory Compliance
sponsored by TechTarget Security
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

TechTarget Security

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM