Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"
-
Identity security buyer’s guide
Sponsored by: SailPoint TechnologiesLeaders across industries are recognizing that digital identities and their access across the organization today are essential to securing the business. This guide is designed as a blueprint for your journey to a future-proof and successful identity security program. Read on to learn more.
-
Top 10 cyber security stories of 2021
Sponsored by: TechTarget ComputerWeekly.comCyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
-
Computer Weekly - 22 June 2021: A new three-year plan for digital government
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
-
Suffocating to Optimize Time with Patients?
Sponsored by: ModuleMDAs respiratory, allergy, and ENT conditions rise, providers face burnout and inefficient workflows. This whitepaper explores how AI-powered solutions from ModuleMD can streamline administrative tasks, enhance patient engagement, and improve care coordination to boost efficiency and patient outcomes. Read the full whitepaper to learn more.
-
A Computer Weekly e-guide to WAN & applications services
Sponsored by: TechTarget ComputerWeekly.comOne of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).
-
Identity Governance & Administration Solution Buyer’s Guide
Sponsored by: SaviyntOver the last few years, cloud acceleration, security threats, and constant technology transformation have bombarded enterprises. IGA is fundamental to modern enterprise security. Importantly, IGA builds a foundation for Zero Trust across cloud, hybrid, and on-prem environments. Read on to learn more.
-
Digital Experience platforms intensify customer engagement programmes
Sponsored by: TechTarget ComputerWeekly.comDigital Experience Management platforms are developing and becoming more sophisticated as companies seek to intensify relationships with customers in order to gain competitive advantage against their peers. Improving customer experience will only become evermore important as companies endeavor to navigate an increasingly turbulent economy.
-
2024 global threat report
Sponsored by: CrowdStrikeThe advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.
-
Identifying Use Cases For Ai In Procurement Turning Vision Into Reality
Sponsored by: GEPBy 2026, Gartner predicts, over 80% of businesses will have leveraged generative AI–powered application program interfaces or models. So, what will this massive adoption mean for procurement organizations? In this 15-page white paper, discover AI use cases for procurement leaders.
-
Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.