Government Regulations Reports

CW Europe – June 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.
Posted: 08 Feb 2021 | Published: 08 Jun 2017

TechTarget ComputerWeekly.com

Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Jul 2020

TechTarget ComputerWeekly.com

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Pulse E-zine: Vol. 3, No. 2
sponsored by TechTarget Health IT
EZINE: While the health IT spotlight shifts to the release of stage 3 meaningful use guidelines, many providers are still struggling with stage 2 reporting. In this issue of Pulse, learn what's next for meaningful use, how it has affected EHRs, and how to align an analytics plan with the needs of your organization.
Posted: 23 Mar 2015 | Published: 19 Mar 2015

TechTarget Health IT

Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act
sponsored by Absolute
CASE STUDY: This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.
Posted: 13 Nov 2013 | Published: 31 Dec 2012

Absolute

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by TechTarget Security
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

Pervasive Data Profiler v4
sponsored by Pervasive Integration
PRODUCT DEMO: Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data
Posted: 11 Jan 2008 | Premiered: 11 Jan 2008

Pervasive Integration

Records Management Strategies to Maintain Regulatory Compliance
sponsored by TechTarget Security
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

TechTarget Security