SAP Security Reports

Data protection: Not just about personal data and compliance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 08 Feb 2021 | Published: 18 Apr 2017

TechTarget ComputerWeekly.com

Europe's controversial digital vision for the next decade
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 08 Feb 2021 | Published: 16 Jun 2020

TechTarget ComputerWeekly.com

CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023

TechTarget ComputerWeekly.com

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
sponsored by Red Hat
WHITE PAPER: This whitepaper will introduce you to the key differentiators that set Red Hat Enterprise Linux apart in regards to security for next-generation datacenters. Read on to learn more.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Red Hat

Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Advanced Performance Management for Today's Complex, Critical Databases
sponsored by Dell Software
WHITE PAPER: Read this informative resource to learn about how advanced performance management can help you meet the demands of high performance and around-the-clock uptime.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

Dell Software

Server Optimization, Hardware and Virtualization
sponsored by DELL TECHNOLOGIES AND MICROSOFT
EGUIDE: In this expert e-guide, find out how to optimize SQL Server with the right choices for hardware, storage devices, and virtualization. Inside, find articles on: what not to do when purchasing hardware; if solid-state storage devices are worth the cost; hardware and risk considerations for an inevitable virtualization initiative.
Posted: 10 Jan 2012 | Published: 09 Jan 2012

DELL TECHNOLOGIES AND MICROSOFT

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
sponsored by IBM
WHITE PAPER: This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

IBM

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits