ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • CW APAC buyer's guide to cloud security

    Sponsored by: TechTarget ComputerWeekly.com

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

  • Taking a zero trust approach to IAM in Atlassian Cloud

    Sponsored by: Atlassian

    Discover in this e-book how you can extend your company-wide IAM policies and build a proactive defense strategy to protect your users and data in Atlassian Cloud.

  • A Buyer’s Guide to Enterprise Agile Planning Solutions

    Sponsored by: Digital.ai

    In this exclusive e-book, find out how Digital.ai Agility can help your organization unlock new customer products and services, optimized customer experiences, better business process insights and accelerated time to market.

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

  • Coalition 
 Managed Detection and Response

    Sponsored by: Coalition

    Organizations that leverage managed detection and response (MDR) typically have a 50% faster mean time to respond, according to a report by Orca Security. To learn about other benefits that MDR can drive, browse this overview.

  • MicroScope – October 2023: Automating repetition in storage and backup management

    Sponsored by: MicroScope

    In this issue, we explore how the growing hype of generative artificial intelligence is set to make change in the storage and backup management world, as well as the concerns and limits of the technology. Also, read about the importance of getting MSSPs and suppliers on the same page, and how SSC is moving to meet customer needs.

  • Computer Weekly - 22 June 2021: A new three-year plan for digital government

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: TechTarget ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • Accelerating Zero Trust Capabilities

    Sponsored by: Saviynt

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.