Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"
-
RSA Conference 2020 guide: Highlighting security's human element
Sponsored by: TechTarget ComputerWeekly.comThe theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
-
Building a Cyberresilient Data Recovery Strategy
Sponsored by: Veeam SoftwareBuilding a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
-
The next step for your legacy workloads is AWS
Sponsored by: AllCloudThe pace of business is increasing, and organizations that don't put in the effort now to ensure their organization is agile enough to keep up will soon find themselves at a competitive disadvantage. This white paper looks at how AWS and AllCloud can help your organization prepare for the future. Read on to learn more.
-
A Computer Weekly buyer's guide to training programmes and tools
Sponsored by: TechTarget ComputerWeekly.comIt's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
-
Computer Weekly – 20 September 2022: A gold medal performance for networking
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
-
Royal Holloway: Information security of the 2016 Philippine automated elections
Sponsored by: TechTarget ComputerWeekly.comWe analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
-
Print security: An imperative in the IoT era
Sponsored by: TechTarget ComputerWeekly.comAnalyst group Quocirca gives the perspective on the risks and best practices of print security.
-
Enterprise 2030: Building The AI Powered Company Of The Future
Sponsored by: TeradataAccess this research report to learn why the most future-ready organizations will be the ones that make AI a competitive advantage, as well as 4 steps business leaders can take today to accelerate their transformations, starting with evaluating their data and AI maturity.
-
CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits
Sponsored by: TechTarget ComputerWeekly.comTech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.
-
5 Critical Security Callouts to Know in 2024
Sponsored by: CiscoCisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.