Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"
-
Anatomy Of Identity Based Attacks
Sponsored by: Okta74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
-
CW ANZ: Trend Watch – Security
Sponsored by: TechTarget ComputerWeekly.comWith regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
-
The future of SAP ECC - Make an informed decision about your ERP roadmap
Sponsored by: TechTarget ComputerWeekly.comStandard support is being extended to 2027, while SAP will continue to offer extended support until 2030, in a bid to get businesses to migrate to S/4 Hana. Should you run legacy business software for 15 more years? Following SAP's decision to extend ECC support, that is a question many CIOs will ask.
-
How To Deploy A Password Policy
Sponsored by: Specops SoftwareThis white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.
-
CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
Sponsored by: TechTarget ComputerWeekly.comThe European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
-
Zero trust: Taking back control of IT security
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
-
Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
Sponsored by: Schneider ElectricIn this paper, find out everything you need to know about Scope 3 emissions, and explore an inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
-
Datacentre design and facilities: What you need to know
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a look at some of the latest thinking and trends around datacentre design, while shining a light on the differing approaches organisations take to ensure their server farms remain up and running, and can withstand all the compute demands expected of them.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Top 10 artificial intelligence stories of 2019
Sponsored by: TechTarget ComputerWeekly.comAccording to Gartner's 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. These are Computer Weekly's top 10 AI articles in 2019.