Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"
-
Towards software-defined and cloud-native networking
Sponsored by: TechTarget ComputerWeekly.comAs networking equipment rapidly evolves to being software-defined and cloud-native, there is pronounced interest in products and services to accelerate service delivery, improve end-user experiences, and reduce infrastructure and operational costs in service delivery applications. Read more in this e-guide.
-
Atlassian Cloud Architecture And Operational Practices
Sponsored by: AtlassianThis white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
-
Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
Sponsored by: Schneider ElectricIn this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
-
Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
-
Disaster recovery has never been so easy or important
Sponsored by: TechTarget ComputerWeekly.comDisaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.
-
The Threat Prevention Buyer’s Guide
Sponsored by: ZscalerThis Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.
-
Computer Weekly Buyer's Guide to SD-WAN services
Sponsored by: TechTarget ComputerWeekly.comIn this 14-page buyer's guide, Computer Weekly looks at howSD-WAN effectively removes telcos' lock-in, the ways hybrid deployment hinges on the network, and the flexibility demanded by cloud-based workloads.
-
A Computer Weekly e-guide to SASE
Sponsored by: TechTarget ComputerWeekly.comCovid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
-
A Computer Weekly Buyer's Guide to Internet of Things Security
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
-
Security analytics: Enabling organisations to get ahead of attackers
Sponsored by: TechTarget ComputerWeekly.comIn the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.