EZINE:
With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
EZINE:
In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.
EZINE:
Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
EGUIDE:
Surging big data is changing data modeling techniques and app development cycles. Read on to discover what you should expect from big data's near-future and best practices when it comes to transitioning big data applications into the production stage.
EGUIDE:
Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
WHITE PAPER:
This whitepaper considers the specific challenges facing government infrastructures when it comes to rapidly growing traffic, especially for instances like increasing unemployment. Read on to discover the widespread effects of a buckling infrastructure, and how you can better serve your citizens with the right technology.
WHITE PAPER:
What companies need are agile analytics tools that help users get insights, and help IT maximize its bandwidth and abilities to help reach business goals. Answer these 5 key questions to help IT pros and business users leverage data.
EBOOK:
This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
WHITE PAPER:
How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.