DG Reports

8 electronic signature best practices to build in to your workflow
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Here are 8 tips to think about when creating an e-signing process include cataloging documents requiring signatures, building user stories and determining necessary software features.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

Data governance for all seasons and reasons
sponsored by TechTarget ComputerWeekly.com
EGUIDE: To promote business buy-in and avoid resistance to governance policies, programs should be business-driven, with data owners involved and the data governance committee making the decisions on standards, policies and rules. This infographic highlights some of the best practices for implementing and managing data governance programs.
Posted: 17 Oct 2022 | Published: 17 Oct 2022

TechTarget ComputerWeekly.com

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Infographic: Comparing data protection vs. data security vs. data privacy
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: An organization's data is one of its most valuable assets and must be protected accordingly. Because there are so many ways data can potentially be compromised, organizations must take a multifaceted approach to ensure the well-being of their data. This means focusing on three key areas: data protection, data security and data privacy.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Data quality emerges from Covid-19 more critical than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Building a Business Glossary—and Why You Should
sponsored by Intozetta Ltd
EGUIDE: Read this e-guide to learn how to create a commonly understood collection of data definitions within your organization that will keep your analytics optimized and in sync for improved long-term profitability.
Posted: 04 Jun 2019 | Published: 31 Dec 2018

Intozetta Ltd

Mastering Digital Business With Multidomain Mdm Saas
sponsored by Informatica
DATA SHEET: With master data management (MDM), you can standardize definitions and formats for customers, materials, products, suppliers, cost centers, and other domains of master data. For insight into Informatica’s Multidomain MDM SaaS and how your company could benefit from this solution, read the datasheet here.
Posted: 29 Aug 2022 | Published: 31 Aug 2022

Informatica

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio