Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"
-
State of Application Security 2024
Sponsored by: CloudflareToday’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
-
SAP GRC Framework Integration with One Identity Manager
Sponsored by: One IdentityBuilt in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.
-
UX is the great enabler of public sector digitisation
Sponsored by: Ensono LimitedIn this white paper, take a close look at how the public sector can put the citizen at the heart of plans for digitization and identity management and create flexibility and robust solutions for the future.
-
Deloitte Global CIO Survey 2018 – UK Edition
Sponsored by: TechTarget ComputerWeekly.comFewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
-
Computer Weekly – 26 November 2019: Why thousands of IT contractors face 'life-changing' tax bills
Sponsored by: TechTarget ComputerWeekly.comIn this issue of Computer Weekly, we investigate HMRC's loan charge policy, a retrospective tax grab that has left thousands of IT contractors facing financial ruin. We compare the cloud storage offerings from AWS, Microsoft and Google. And we find out how retailers are turning to tech to deal with a new generation of shoppers.
-
Living Off The Land Attacks
Sponsored by: CyberFOXCybercriminals are using legitimate tools to infiltrate systems and steal data. Learn how privileged access management and blocklisting can reduce your attack surface and prevent "living off the land" attacks. Read the full e-book to discover practical ways to enhance your security.
-
Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
-
Computer Weekly – 30 May 2023: Can the UK cash in on chips?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
-
MicroScope – February 2021: The forecast on channel security
Sponsored by: MicroScopeMicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
-
UK IT Priorities 2016
Sponsored by: TechTarget ComputerWeekly.comEvery year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.