ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20start=10"

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.

  • CW Benelux February 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • How Managed XDR Bolsters Businesses’ Cybersecurity Posture

    Sponsored by: NCC Group

    As the network perimeter is now everywhere, security must move with it and be in place at the point of access. Learn how Managed XDR can bolster your business's cybersecurity posture - download the e-book.

  • A Computer Weekly E-guide to NAS

    Sponsored by: TechTarget ComputerWeekly.com

    In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.

  • Computer Weekly - 23 November 2021: Can the tech community show how to save the world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • Public cloud in India: A guide to building digital resiliency

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the rise of India as a cloud powerhouse, what major suppliers are doing in the market and an expert's take on the importance of having a cloud operating model to drive business outcomes from cloud initiatives.

  • Computer Weekly – 7 February 2023: Making IT security training stick

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.

  • Computer Weekly – 28 May 2024: Digital border problems are stacking up

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the government's post-Brexit plans for digital borders as problems begin to emerge. We find out about AI PCs and ask whether they will make any difference for enterprise IT. And we talk to Red Hat CEO Matt Hicks about the open source opportunities from AI. Read the issue now.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.