ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10"

  • Living Off The Land Attacks

    Sponsored by: CyberFOX

    Cybercriminals are using legitimate tools to infiltrate systems and steal data. Learn how privileged access management and blocklisting can reduce your attack surface and prevent "living off the land" attacks. Read the full e-book to discover practical ways to enhance your security.

  • How AI is Impacting Healthcare

    Sponsored by: XtelligentMedia Healthcare

    President Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.

  • Why Modernizing With SAP S/4HANA Cloud Makes Business Sense

    Sponsored by: NTT & SAP

    Modernizing to the cloud-based SAP S/4HANA suite can deliver resilience, agility, and productivity benefits. Learn about the process, data migration considerations, and innovations that can help your organization through this white paper.

  • MicroScope – May 2023: Vendors need to listen and learn

    Sponsored by: MicroScope

    In this month's MicroScope ezine, we look at why it is vital that vendors listen to partners and act on the feedback. We also look at what's next for HP's advancing sustainability programme, Amplify Impact. Read the issue now.

  • Digital Disruption Index – from experimentation to transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.

  • MicroScope – March-April 2024: Is cloud the best option?

    Sponsored by: MicroScope

    In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year

  • Artificial Intelligence (AI) And The Future Of Application Security Testing

    Sponsored by: Veracode

    With advances in AI capabilities, hackers have leveraged the evolving technology in order to perform more sophisticated attacks at scale. If actual attacks are using AI, then simulated attack testing that is performed at scale using AI is as close of a simulation to the real thing as one could hope for. Read on to learn more.

  • Akamai Guardicore Segmentation PCI DSS Whitepaper

    Sponsored by: Akamai Technologies

    A new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.

  • Security Think Tank: Biden's Cyber Security Plan

    Sponsored by: TechTarget ComputerWeekly.com

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

  • GenAI: Empowering enterprises and engineering for the future

    Sponsored by: Virtusa

    Discover how generative AI (genAI) is transforming enterprises and engineering. Learn about leveraging GenAI to build new revenue streams, boost productivity, and enhance data engineering. Explore the enterprise readiness of AI tools and Virtusa's perspective on empowering the future. Read the white paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.