Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
Focus: Enterprise Mobility Management
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.
-
CIO Trends #8: Benelux
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.
-
CIO Trends #8: Benelux
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.
-
AI in Fraud Management: Uses cases, benefits and challenges
Sponsored by: TechTarget ComputerWeekly.comAI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
Computer Weekly – 2 October 2018: The most influential women in UK technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology, and talk to this year's winner, Code First:Girls CEO Amali de Alwis, about the challenges of achieving diversity in IT. Also, our latest buyer's guide looks at the future of collaboration software. Read the issue now.
-
Manchester United praised for swift response to cyber attack
Sponsored by: TechTarget ComputerWeekly.comThe Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
-
CIO Trends #9: Benelux
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
-
UK IT Priorities 2016
Sponsored by: TechTarget ComputerWeekly.comEvery year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.