ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • The Secure Coding Handbook

    Sponsored by: Veracode

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

  • Eggplant Helps the Mauritius Commercial Bank Increase Testing Efficiency

    Sponsored by: Keysight

    Mauritius Commercial Bank used Eggplant to automate 70% of its regression testing, cutting upgrade time from 400 to 120 work days. This case study details how Eggplant helped MCB achieve full end-to-end testing and save 1,480 work days. Read the full case study to learn more.

  • Top 14 ransomware targets in 2023 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

  • Six Critical Capabilities of Saviynt’s Application Access Governance

    Sponsored by: Saviynt

    Moving to Zero Trust can improve security while enabling users with right-time, right-level access. The process requires moving from a mindset of implicit trust to the continuous re-evaluation of risk. Read this white paper to learn more about the three key aspects to a successful Zero Trust adoption.

  • Using IT initiatives to save money and reinforce green credentials

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.

  • Computer Weekly – Dell Technologies aims for an intelligent, connected future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.

  • Ultimate IoT implementation guide for businesses

    Sponsored by: TechTarget ComputerWeekly.com

    IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.

  • Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.

  • Web security: Important but often overlooked

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.