ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Top 10 cyber security stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.

  • Maximizing the Business Value of AI with a Digital Platform

    Sponsored by: ServiceNow

    As companies enhance digital capabilities, maximizing AI value is critical. This IDC report explores how a digital platform approach can help organizations drive business impact through AI, improve customer experience, and achieve better outcomes. Download the full report to learn more.

  • Escaping legacy – removing a major roadblock to a digital future

    Sponsored by: TechTarget ComputerWeekly.com

    Core legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.

  • DevSecOps delivers better business

    Sponsored by: TechTarget ComputerWeekly.com

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

  • CHAPTER 13: IT Troubleshooting

    Sponsored by: McGraw Hill

    Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.

  • The Cloud Connectivity Cookbook

    Sponsored by: Aryaka

    As enterprises move to the cloud, network connectivity is critical for consistent application performance. This e-book explores the importance of multi-cloud networking, best practices for selecting the right cloud service provider, and how Aryaka's Unified SASE can deliver optimized connectivity. Read the full e-book to learn more.

  • What the future holds for cloud management in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we dish out useful tips from APAC organisations that have successfully migrated to the cloud, the thinking behind their approaches to cloud migration and what they are doing to not only keep the lights on, but also raise their game in areas such as cloud data management and cloud security.

  • Considerations for Implementing Zero Trust for the Workforce

    Sponsored by: Cloudflare

    As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.

  • Zero Trust for the Workforce July 2024

    Sponsored by: Cloudflare

    Cloudflare commissioned Enterprise Strategy Group to survey 200 senior IT security decision-makers about their approach to securing user access to corporate apps and resources, across traditional, digital-native, and public-sector organizations. Download the eBook to see the consensus about Zero Trust for the workforce.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.