Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"
-
CW ASEAN: Time to dial up defences
Sponsored by: TechTarget ComputerWeekly.comIn this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
-
CW Europe - June-August 2022: Russia escalates cyber war on Ukraine
Sponsored by: TechTarget ComputerWeekly.comMicrosoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.
-
Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
-
KLAS Research Patient Engagement Ecosystem Report 2023
Sponsored by: Gozio HealthDownload the KLAS Research Patient Engagement Ecosystem Report 2023 today to get the latest insights on digital health tools and vendor capabilities.
-
How To Deploy A Password Policy
Sponsored by: Specops SoftwareThis white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.
-
Calculating ROI of DCIM Monitoring for Distributed IT Sites
Sponsored by: Schneider ElectricIn this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.
-
Zscaler ThreatLabz State of Encrypted Attacks Report
Sponsored by: ZscalerEncrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
-
The Total Economic Impact™ Of Honeycomb
Sponsored by: HoneycombTo help DevOps and engineering teams enhance their production processes, Honeycomb developed an observability tool. Tap into this “Total Economic Impact” report to review Forrester’s analysis of the tool.
-
Poland's Storage market on the rise
Sponsored by: TechTarget ComputerWeekly.comPoland's storage market has been on a steady rise but what's the reason behind this? We investigate...
-
IAM: Key to security and business success in the digital era
Sponsored by: TechTarget ComputerWeekly.comAs more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.