Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
Computer Weekly – 13 February 2024: Intelligent defence – the role of data in the military
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK's fastest supercomputer. Read the issue now.
-
Guide to business continuity planning during COVID-19
Sponsored by: TechTarget ComputerWeekly.comAs COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
Build a Better Webinar Day of Execution
Sponsored by: BrightTALK by TechTargetYou've spent weeks preparing for your webinar and done most of the heavy lifting before your go-live day. Now it's show time! Ensuring everything goes smoothly during your webinar is key to delivering a positive and engaging audience experience. Browse this e-book to learn more.
-
Brought To You By: Servicenow Customer Operations Dummies
Sponsored by: ServiceNowCustomers want answers to their issues and requests yesterday. So, how can you empower your teams to deliver proactive service? Check out “Customer Operations for Dummies, 2nd ServiceNow Special Edition,” your guide for fueling seamless customer experiences.
-
Mapping and Reducing Scope 3 Emissions
Sponsored by: GEPToday, procurement organizations face a handful of pressing sustainability issues, the most formidable of them being scope 3 emissions. So, how can companies best address these problems and build an effective, end-to-end emissions reduction framework? Browse this white paper to learn more.
-
Build Modern Applications on AWS eBook
Sponsored by: AWSTake a look through this e-book to learn about building modern applications on AWS, and to see the success that working on AWS has delivered for businesses like Coca Cola.
-
2024 State of Application Security Report
Sponsored by: CrowdStrike8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.
-
Addressing Zero Trust for Government: The Role of Identity Security
Sponsored by: Merlin InternationalAs governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.