Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
State of GDPR in mainland Europe
Sponsored by: TechTarget ComputerWeekly.comThe General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
-
Enterprise Buyers’ Guide to Data Protection 2024
Sponsored by: Veeam SoftwareThe Enterprise Buyers' Guide to Data Protection 2024 is designed to highlight key market trends and challenges while providing information on what capabilities and processes organizations should consider implementing.
-
Anatomy Of Identity Based Attacks
Sponsored by: Okta74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
-
The State of Data Culture Maturity: Research Report
Sponsored by: AlationA data intelligence organization recently surveyed nearly 300 global data leaders to understand where businesses lie on the data maturity curve today and gauge what the future might look like. Read on to understand why data culture is not merely a buzzword but a fundamental necessity for organizations aiming to thrive in the digital age.
-
CW APAC – October 2020: Trend Watch: Storage
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.
-
Computer Weekly - 10-16 September 2019: A tech boost for social care
Sponsored by: TechTarget ComputerWeekly.comIn this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
-
Secure remote IT support in 3 steps
Sponsored by: TeamViewerAs an IT security expert, you know that the challenges of protecting connected enterprises are evolving. To provide borderless access effectively, you need a powerful remote connectivity solution. But how do you get buy-in from leadership? Read this white paper to take the first step to toward secure remote IT support.
-
PKI: Are You Doing It Wrong?
Sponsored by: VenafiA foundation of trust in modern businesses, this white paper argues, is a well-maintained public key infrastructure (PKI). Unfortunately, many organizations are making mistakes that compromise their PKI management. To learn about those mistakes – and how to sidestep them – download the paper.
-
PKI: Are You Doing It Wrong?
Sponsored by: CyberArkPKI management is difficult enough, but when you couple it with today’s explosive growth of machines and shortening certificate lifespans, the job gets a whole lot harder. Read this eBook to hear 8 cautionary tales around PKI gone wrong, and explore how you can modernize your PKI to avoid future problems.
-
How to Choose a Background Check Provider for Hiring at Scale
Sponsored by: CheckrIn a tight labor market, choosing the wrong background screening provider could be a costly mistake. This guide shares five ways the best background check partner can help you get ahead in your hiring market—plus the questions you need to ask and must-have solutions when choosing a provider.