Premium Content

Access "Computer Weekly Buyer's Guide to data security"

CWE_BG_April2012_datasecurity_252.png

Sponsored by ComputerWeekly.com

As the smartphone phenomenon has taken off, chief information security officers have needed to rethink what personal computing security really means –especially as the European Commission seeks to harmonise data protection law across EU member states.  Access >>>

Table of contents

  • How CISOs can keep up security best practice in a threat landscape in flux
  • Adapting to new data rules
  • How to navigate the EU data reforms
  • The issues businesses must consider to comply with EU data regulation

 

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • FM, IT and Data Centres
    FM,-IT-and-Data-Centres-(1363364633_575).jpg
    E-Handbook

    Are Facilities and IT data centre managers implacable enemies, or is it just a need for different priorities and emphases on work that seem to get in...

  • Underexposed risks of public Wi-Fi hotspots
    Underexposed-risks-of-public-Wi-Fi-hotspots-(1363361185_647).jpg
    E-Handbook

    All is not always as it appears when users access public Wi-Fi networks via seemingly authentic and trustworthy providers. This article, in our ...

  • Musings on datacentres
    Musings-on-datacentres-(1363019585_48).jpg
    E-Handbook

    2012 was a year when organisations had to face up to the fact that the basis of IT was beginning to change. Energy costs were rapidly escalating, new...