RESEARCH CONTENT:
In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.
EZINE:
In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
WHITE PAPER:
In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
EGUIDE:
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
EGUIDE:
In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
EGUIDE:
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
EGUIDE:
Download this e-guide to learn how e-discovery is conquering containerized data with comprehensive cloud-based strategies, and explore how e-discovery's existence has changed the world of law through collaboration.
WEBCAST:
This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
WHITE PAPER:
Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.