Right of Privacy Reports

Australia's cybersecurity game plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

Executive Interview: Unleashing blockchain's potential
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 May 2020

TechTarget ComputerWeekly.com

Infographic: Gartner AI and compliance spending forecast
sponsored by TechTarget ComputerWeekly.com
EGUIDE: More than 60 jurisdictions around the world have proposed or are drafting postmodern privacy and data protection laws as a result. This infographic shows Gartner AI and compliance spending forecast.
Posted: 08 Feb 2021 | Published: 25 Feb 2020

TechTarget ComputerWeekly.com

The difficulties of defending against web tracking
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 08 Feb 2021 | Published: 22 May 2018

TechTarget ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

E-Book: New Rules for HIPAA
sponsored by TechTarget Security
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

TechTarget Security

Government insists 'nothing sinister' about web user data gathering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Computer Weekly – 20 August 2013: Mixing work and play – how corporate applications can learn from computer games
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

TechTarget ComputerWeekly.com

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine