EGUIDE:
The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
EGUIDE:
This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
EZINE:
In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
EZINE:
In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
EZINE:
Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
EZINE:
Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
RESOURCE:
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
EZINE:
Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
WHITE PAPER:
This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.