Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"
-
Royal Holloway: Information security of the 2016 Philippine automated elections
Sponsored by: TechTarget ComputerWeekly.comWe analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
-
Urban Myths About Secure Coding
Sponsored by: Veracode, Inc.Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.
-
Essential Guide: APAC women in cyber security
Sponsored by: TechTarget ComputerWeekly.comIn Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
-
Computer Weekly – 3 October 2017: Digitally preserving history
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how cloud technologies are helping Gibraltar to digitally preserve historic documents and safeguard its cultural heritage. We examine progress on the roll-out of the new NHS national network. And our latest buyer's guide looks at cloud-based ERP software. Read the issue now.
-
Reinventing Backup and Recovery With AI and ML
Sponsored by: Veeam SoftwareTo gain insight into these AI and ML trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and data professionals familiar with and/or responsible for data protection (including backup and recovery) decisions and data science for their organization. Read this exclusive ESG and Veeam eBook to find out more.
-
Minimum Viable Governance
Sponsored by: ModelOpEnterprises must implement AI governance programs to address risks and prepare for regulations like the EU AI Act. This white paper outlines a "Minimum Viable Governance" framework to inventory AI systems, enforce light controls, and report on AI usage and risks - without stifling innovation. Read the full white paper now to learn more.
-
Computer Weekly - 6 July 2021: Where to start with Windows 11
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.
-
Converting CentOS Linux to Red Hat Enterprise Linux
Sponsored by: Red HatLearn how to convert your CentOS Linux systems to Red Hat Enterprise Linux (RHEL) with the Convert2RHEL tool. This overview covers conversion methods, the benefits of RHEL, and how Red Hat Consulting can help with complex migrations. Read the full product overview to get started.
-
Going big: why companies need to focus on operational analytics
Sponsored by: TechTarget ComputerWeekly.comThis report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations
-
2024 PKI and Post-Quantum Trends Study
Sponsored by: Entrust, Inc.In this report, Ponemon Institute presents the findings based on a survey of 2,176 IT and IT security personnel who are involved in their organizations’ enterprise PKI, distilling the findings in order to provide you with essential guidance. Read now to learn more.