RESEARCH CONTENT:
This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
EZINE:
In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
EGUIDE:
This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.
EGUIDE:
This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
EGUIDE:
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
EGUIDE:
Download this e-guide to learn how e-discovery is conquering containerized data with comprehensive cloud-based strategies, and explore how e-discovery's existence has changed the world of law through collaboration.
CASE STUDY:
This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!
PRESENTATION TRANSCRIPT:
In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
EBOOK:
Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.