Privacy Reports

Webinar: Who You Gonna Call?
sponsored by TechTarget
WEBCAST: Are you aligned to maximize customer revenue across marketing, sales, and customer success? Having the right data and insights will help. In this webinar, get expert tips how to use intent monitoring and the data collected to maximize opportunity capture across the entire revenue lifecycle, and deliver a seamless customer journey.
Posted: 08 Feb 2021 | Premiered: Jun 1, 2020

TechTarget

CW Innovation Awards: SIA taps blockchain for loyalty app
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
Posted: 11 May 2021 | Published: 11 May 2021

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER: When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust