Secure Electronic Commerce Reports

Exchange Insider E-Zine: Volume 8
sponsored by Symantec Corporation
EZINE: In this issue of Exchange Insider, we'll cover topics on how to prep for the BlackBerry Enterprise Server for Exchange 2010 SP1, find out if the Exchange 2010 Storage revamp is for the better, and look at the information rights management protection in Exchange 2010.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Symantec Corporation

Broadcast Delivery of Multimedia Content to Mobile Users
sponsored by QUALCOMM Incorporated
WHITE PAPER: Discover how a broadcast delivery can help you overcome the issues with the currently used HTTP delivery method. Avoid bottlenecks and improve user-experience, all in a cost-effective manner.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

QUALCOMM Incorporated

CW ASEAN: European data law - be aware and prepare
sponsored by TechTarget ComputerWeekly.com
EZINE: Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
Posted: 08 Feb 2021 | Published: 08 Feb 2018

TechTarget ComputerWeekly.com

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 08 Feb 2021 | Published: 18 Jul 2019

TechTarget ComputerWeekly.com

Policing cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 08 Feb 2021 | Published: 23 Sep 2016

TechTarget ComputerWeekly.com

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

ERP Software Selection Criteria for Midsized Businesses
sponsored by Sage Software
EGUIDE: In this E-Guide, you will gain practical advice and best practices for choosing an ERP system from Jim Shepherd, senior vice president of research for AMR Research.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Sage Software

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Best practices for utilising SharePoint e-discovery capabilities
sponsored by Dell Software
EGUIDE: In this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.
Posted: 08 Sep 2011 | Published: 30 Aug 2011

Dell Software