Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
Shields up! Why Russia's war on Ukraine should matter to security pros
Sponsored by: TechTarget ComputerWeekly.comThe build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
-
IT Project: Internet of Things
Sponsored by: TechTarget ComputerWeekly.comThe internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.
-
AI-Powered Cloud-Hosted Voice Revolutionising Employee Experiences
Sponsored by: Zoom Video CommunicationsCloud-hosted voice powered by AI can transform employee experiences by enhancing collaboration, productivity, and compliance. This IDC InfoBrief explores how cloud voice can revolutionize the future of work. Read the full report to learn more.
-
Scaling Threat Detection & Response
Sponsored by: CoalitionAs organizations continue to search for new ways to reduce costs while staying better protected, many IT leaders have turned to building their active threat mitigation strategies, including managed detection and response (MDR) tactics. But what exactly is MDR? Browse this guide to learn more.
-
The rise of SD-WANs: Time to cross the chasm
Sponsored by: TechTarget ComputerWeekly.comWhere does SD-WAN stand at the beginning of the second quarter of 2022? The solid upward trajectory of SD-WANs has been given further impetus by the parallel emergence and rise of SASE, which integrates SD-WAN with edge security, and the rise persists as SD-WAN pricing becomes more competitive and monitoring capabilities become popular.
-
Public Sector Leaders Discuss IT Infrastructure
Sponsored by: Red HatIn this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.
-
Managing the invisible risk of non-human identities
Sponsored by: One IdentityAs non-human identities (NHIs) proliferate, securing them is critical to avoid breaches and compliance issues. This white paper outlines the risks of unsecured NHIs and best practices for managing them, including identity discovery, risk assessment, and privileged access controls. Learn how to gain visibility and control over your NHIs.
-
CW Benelux November 2019-January 2020: Dutch banks fight money laundering
Sponsored by: TechTarget ComputerWeekly.comDutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
-
Critical Scalability: Trend Micro Security Predictions for 2024
Sponsored by: Trend MicroTo review security predictions for 2024 – which concern generative AI, machine learning models and much more – tap into this 19-page research report by Trend Micro.