Forensic Analysis Reports

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Declaration by David Godkin with 218 exhibits – 17 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Computer Weekly – 21 March 2023: The risks of an imbalance in AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.
Posted: 17 Mar 2023 | Published: 21 Mar 2023

TechTarget ComputerWeekly.com

BlackCat emerges as one of the top ransomware threats
sponsored by TechTarget ComputerWeekly.com
EBOOK: After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

Computer Weekly – 6 August 2019: Using tech to boost staff morale
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 06 Aug 2019

TechTarget ComputerWeekly.com

Virtual and Superior: How to Build Teams that Get Things Done
sponsored by Citrix
WHITE PAPER: This white paper highlights tips and best practices for CIOs looking for more effective ways to cut risk and create value in virtual environments through better teamwork.
Posted: 12 Sep 2012 | Published: 12 Sep 2012

Citrix

CIO Decisions E-Zine: PPM: Validating the Value of IT
sponsored by TechTarget CIO
EZINE: This e-zine breaks down how PPM tools and best practices simplified project management and justified IT project service delivery and costs.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

TechTarget CIO

Presentation Transcript: Key tips for a successful healthcare analytics program
sponsored by Orion Health
PRESENTATION TRANSCRIPT: This presentation transcript presents key tips for a successful health care analytics program. Listen now for valuable perspectives on the challenges and lessons learned regarding data analytics and how it effects EHR and health information exchange (HIE) initiatives.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

All resources sponsored by Orion Health

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise