Digital Forensics Reports

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

CW Nordics ezine November 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
Posted: 08 Feb 2021 | Published: 16 Nov 2018

TechTarget ComputerWeekly.com

CW APAC, March 2021: Tech career guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.
Posted: 15 Mar 2021 | Published: 04 Mar 2021

TechTarget ComputerWeekly.com

CW Benelux ezine August 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".
Posted: 08 Feb 2021 | Published: 09 Aug 2018

TechTarget ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 08 Feb 2021 | Published: 18 Jul 2019

TechTarget ComputerWeekly.com

Policing cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 08 Feb 2021 | Published: 23 Sep 2016

TechTarget ComputerWeekly.com

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

CIO Decisions e-zine: Big data analytics, the power of personalized data
sponsored by TechTarget CIO
EZINE: This edition of the CIO Decisions e-zine demonstrates how BI and data analytics are dramatically changing the way businesses interact with their data. Inside, learn how the Obama campaign used "microtargeting" techniques to read the polls and understand how they were changing and evolving during the campaign.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

TechTarget CIO

Information Security Asean July 2015
sponsored by TechTarget
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget