Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
Security Threats for Apps “In the Wild”
Sponsored by: Digital.aiDownload this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.
-
Fail to prepare quality data, prepare to fail
Sponsored by: TechTarget ComputerWeekly.comFail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".
-
CW Middle East Jan to Mar 2018
Sponsored by: TechTarget ComputerWeekly.comThe Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
-
The Total Economic Impact™ Of Cloudflare’s Connectivity Cloud
Sponsored by: CloudflareCloudflare's connectivity cloud can help enterprises reduce complexity, improve security, and boost productivity. Learn how it can deliver cost savings and business benefits in this Forrester Total Economic Impact study. Read the full report to explore the potential ROI.
-
Authentication After Passwords
Sponsored by: OktaThe future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.
-
MicroScope: The digital transformation
Sponsored by: MicroScopeThe phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.
-
Unlocking value in the railway network's data
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
-
Unlocking value in the railway network's data
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
-
Computer Weekly - 7 April 2020: Adapting IT to the new normal
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
-
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
Sponsored by: TechTarget ComputerWeekly.comIn this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act