DG Reports

Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

Essential Guide: What the EU Data Protection Regulation changes mean to you
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.
Posted: 08 Feb 2021 | Published: 20 Nov 2017

TechTarget ComputerWeekly.com

Data governance for all seasons and reasons
sponsored by TechTarget ComputerWeekly.com
EGUIDE: To promote business buy-in and avoid resistance to governance policies, programs should be business-driven, with data owners involved and the data governance committee making the decisions on standards, policies and rules. This infographic highlights some of the best practices for implementing and managing data governance programs.
Posted: 17 Oct 2022 | Published: 17 Oct 2022

TechTarget ComputerWeekly.com

No deal Brexit: Ideal or Ordeal?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.
Posted: 08 Feb 2021 | Published: 28 Feb 2019

TechTarget ComputerWeekly.com

CW APAC: Expert Advice on data management
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

Focus ASEAN: Analytics & data-driven insights
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, learn how Singapore's central bank as well as universities and research facilities are driving the adoption of analytics and data science, and how SAS is prepping its marketers for the data flood.
Posted: 08 Feb 2021 | Published: 29 Jun 2017

TechTarget ComputerWeekly.com

A Computer Weekly buyer’s guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com

Big data security management embraces governance, privacy
sponsored by TechTarget Data Management
EBOOK: Cyberattacks, GDPR and CCPA compliance, and the COVID-19 pandemic present serious challenges to big data security management practices. Data managers look to a combination of governance policies and evolving data security tools to protect the quality and integrity of their data stores.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

TechTarget Data Management

Data governance more important now than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

TechTarget ComputerWeekly.com

How to unlock the true value of data
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com