Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"
-
Toughening up web and mobile application security
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
A 4-Step Plan For Denial Prevention
Sponsored by: WaystarWhat do you do when staff don’t have the time, money, or resources to work denials as thoroughly as they’d like? The technology and tactics to prevent denials is here and you can unlock a proven approach to denial prevention. Get a step-by-step denial prevention plan in this e-book.
-
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
Sponsored by: TechTarget ComputerWeekly.comIn this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
-
SD-WAN: Accelerating network transformation in APAC
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
-
SD-WAN: Accelerating network transformation in APAC
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
-
Threat Intelligence Report 2024
Sponsored by: NOKIAThe latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
-
10 Challenges Semiconductor Fabs Can Transform into Business Opportunities
Sponsored by: Schneider ElectricIn this reference guide, explore how the semiconductor fabrication industry can overcome the top 10 challenges and transform them into business opportunities, and discover via specific use cases how leading practices enable semiconductor fabs to enhance global competitiveness.
-
CW APAC October 2023 – Buyer’s guide to IAM
Sponsored by: TechTarget ComputerWeekly.comIdentity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
-
Zero trust: Taking back control of IT security
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
-
Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async
Sponsored by: Fabric HealthDiscover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.