Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"
-
Hacking the Human Operating System
Sponsored by: TechTarget ComputerWeekly.comCyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Improve How Your Teams Build Custom Software With Vmware Tanzu Labs
Sponsored by: VMwareBuilding custom software is a process that involves various teams: development, design and operations, to name a few. So, how can you modernize how teams at your organization approach the collaborative endeavor? Find guidance in this overview by VMware.
-
Are you one eDiscovery away from a budgetary meltdown?
Sponsored by: TechTarget ComputerWeekly.comUsing an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.
-
The ultimate guide to data preparation
Sponsored by: TechTarget ComputerWeekly.comPoor data equates to wrong decisions, bias in the AI algorithm and flawed decision-making. What's more, data that personally identifies an individual can only be used in very specific ways, as stipulated by GDPR. Read about data preparation in this e-guide.
-
Digital identity strategies to enhance data privacy and protect networks
Sponsored by: TechTarget ComputerWeekly.comThe rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
-
Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
-
A Practical Approach to Securing Your Cloud Transformation
Sponsored by: AWS & OptivThis guide explores security, compliance, and cost management in cloud transformation. It highlights practical approaches to securing your cloud environment, including architectural complexity, DevSecOps, and compliance challenges. Read the full white paper to learn how to build a secure-by-design cloud transformation strategy.
-
The CISO's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comSupply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
Digital leaders in the UK 2019
Sponsored by: TechTarget ComputerWeekly.comThis report from management and technology consulting firm BearingPoint is intended to give an assessment and provide a constructive analysis of UK companies' digital maturity, hence the nature of the statistics provided.
-
ADM market insight: Automate SAP testing with OpenText Functional Testing AI-based capabilities
Sponsored by: OpenTextMigrating legacy SAP systems to S/4HANA poses testing challenges. Leverage AI-driven automation with OpenText Functional Testing to build resilient, adaptable test assets that reduce maintenance costs and accelerate test development. Read the e-book to learn more.