Right of Privacy Reports

Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017

TechTarget ComputerWeekly.com

The future of storage
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Oct 2020

TechTarget ComputerWeekly.com

Australia's cybersecurity game plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

Computer Weekly - 2 November 2021: What the Budget means for UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look through the chancellor's Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO's experiences of learning the privacy lessons of GDPR. Read the issue now.
Posted: 29 Oct 2021 | Published: 02 Nov 2021

TechTarget ComputerWeekly.com

Generative AI ethics: 8 biggest concerns and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Generative AI is upending business models and forcing ethical issues like customer privacy, brand integrity and worker displacement to the forefront. These risks require a clearly defined strategy, good governance and a commitment to responsible AI. A corporate culture that embraces generative AI ethics must consider these eight important issues.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

Government insists 'nothing sinister' about web user data gathering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by TechTarget Security
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

TechTarget Security

E-Book: New Rules for HIPAA
sponsored by TechTarget Security
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

TechTarget Security

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine