ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: TechTarget ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Digital Revolution: Moving towards agility

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.

  • Demystifying the myths of public cloud computing

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

  • Cloud migration: Choosing the right strategy and tools

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.

  • CW Europe – March 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.

  • Infographic: 2018 UKI IT Priorities

    Sponsored by: TechTarget ComputerWeekly.com

    Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for decision makers in the UK and Ireland in 2018.

  • CW Benelux February 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • Cloud: A security risk and opportunity

    Sponsored by: TechTarget ComputerWeekly.com

    With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.

  • Multi-Cloud Management

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at how some organisations are overcoming the challenges of multi-cloud, and – in turn – reaping the rewards of expanding the range of suppliers they source services from.

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • Cyber Security Trends 2017 ASEAN

    Sponsored by: TechTarget ComputerWeekly.com

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

  • Cloud Services: The secret weapon for disrupting your business

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out how the cloud has levelled the playing field for Australian startups, why cloud services are beating IT departments and how one Australian bank is turning to the cloud to power its HR operations.

  • Benelux focus: Moving to the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    We look at the evolution of cloud computing take up, with some examples from the Netherlands, then we analyse some of the challenges and opportunities cloud computing brings.

  • Nordics focus: Moving to the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    We focus on cloud computing take up in the Nordic region and feature articles that will help CIOs anywhere in the world on their cloud journeys.

  • Top Cloud Trends for IT Leaders

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the market potential for public cloud services in the Asia-Pacific (APAC) region, Oracle's plans to meet the cloud computing needs of APAC enterprises and how perennial concerns around cloud security are being addressed by the industry.

  • Focus: Private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

  • CW Benelux - May 2017: 3D printing on the rise

    Sponsored by: TechTarget ComputerWeekly.com

    Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.

  • Focus: Securing the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

  • CW Benelux ezine February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

  • IT Relations: HR Manager

    Sponsored by: TechTarget ComputerWeekly.com

    HR and IT departments have begun to work closely together over the last few years. While HR historically has often received limited attention, companies now understand the key role the department plays in the business. Consequently, companies are heavily investing in HR technology, particularly by moving their HR systems to the cloud.

  • IT Relations: HR Manager

    Sponsored by: TechTarget ComputerWeekly.com

    HR and IT departments have begun to work closely together over the last few years. While HR historically has often received limited attention, companies now understand the key role the department plays in the business. Consequently, companies are heavily investing in HR technology, particularly by moving their HR systems to the cloud.

  • Hybrid Cloud workloads: The Essential Guide

    Sponsored by: TechTarget ComputerWeekly.com

    Debate continues to rage within the enterprise about the long-term benefits of adopting a hybrid cloud method of IT consumption. This Essential Guide shows everything the enterprise needs to know.

  • What does cloud computing look like in 2016?

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.

  • Enterprise cloud applications – can we trust them?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.