RESEARCH CONTENT:
This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
EGUIDE:
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
WHITE PAPER:
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
EGUIDE:
In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
EGUIDE:
In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
PRODUCT LITERATURE:
This paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
WHITE PAPER:
Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
EGUIDE:
Generative AI has arrived on the scene with a multitude of ethical issues. In this 13-page buyer’s guide, Computer Weekly explores those considerations, assesses data classification tools and looks at how to improve test data management.
WHITE PAPER:
This whitepaper offers essential advice for governments looking to maximize their resources while increasing their capabilities. Read on to see how analytics could be the answer, offering deeper value from your tax revenue streams.
PRODUCT LITERATURE:
In most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ...