Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"
-
Trust no one: Why zero trust security is taking the world by storm
Sponsored by: TechTarget ComputerWeekly.comAs zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
-
How TDCX is building a people-centric business
Sponsored by: TechTarget ComputerWeekly.comEvery digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.
-
A Deep Dive into Shadow IT: Examples, Risks, and Solutions
Sponsored by: Auvik Networks, Inc.Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.
-
The Total Economic Impact™ Of Dataiku
Sponsored by: DataikuCustomer interviews and financial analysis found that a composite organization experienced benefits of $23.5 million over three years and an ROI of 413% with Dataiku. Plus, 80% time savings on manual processes, reduced costs, and improved decision making on key business activities. Get a copy of the full study to learn more.
-
CIO Trends #7: Nordics
Sponsored by: TechTarget ComputerWeekly.comThis e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.
-
Risk management is the beating heart of your cyber strategy
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Raspberry PI with Java: programming the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
-
Preventing identity theft in a data breach
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Urban Myths About Secure Coding
Sponsored by: Veracode, Inc.Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.