ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • Improve How Your Teams Build Custom Software With Vmware Tanzu Labs

    Sponsored by: VMware

    Building custom software is a process that involves various teams: development, design and operations, to name a few. So, how can you modernize how teams at your organization approach the collaborative endeavor? Find guidance in this overview by VMware.

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: TechTarget ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • The ultimate guide to data preparation

    Sponsored by: TechTarget ComputerWeekly.com

    Poor data equates to wrong decisions, bias in the AI algorithm and flawed decision-making. What's more, data that personally identifies an individual can only be used in very specific ways, as stipulated by GDPR. Read about data preparation in this e-guide.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • A Practical Approach to Securing Your Cloud Transformation

    Sponsored by: AWS & Optiv

    This guide explores security, compliance, and cost management in cloud transformation. It highlights practical approaches to securing your cloud environment, including architectural complexity, DevSecOps, and compliance challenges. Read the full white paper to learn how to build a secure-by-design cloud transformation strategy.

  • The CISO's guide to supply chain security

    Sponsored by: TechTarget ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • Digital leaders in the UK 2019

    Sponsored by: TechTarget ComputerWeekly.com

    This report from management and technology consulting firm BearingPoint is intended to give an assessment and provide a constructive analysis of UK companies' digital maturity, hence the nature of the statistics provided.

  • ADM market insight: Automate SAP testing with OpenText Functional Testing AI-based capabilities

    Sponsored by: OpenText

    Migrating legacy SAP systems to S/4HANA poses testing challenges. Leverage AI-driven automation with OpenText Functional Testing to build resilient, adaptable test assets that reduce maintenance costs and accelerate test development. Read the e-book to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.