ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • Trust no one: Why zero trust security is taking the world by storm

    Sponsored by: TechTarget ComputerWeekly.com

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

  • How TDCX is building a people-centric business

    Sponsored by: TechTarget ComputerWeekly.com

    Every digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • The Total Economic Impact™ Of Dataiku

    Sponsored by: Dataiku

    Customer interviews and financial analysis found that a composite organization experienced benefits of $23.5 million over three years and an ROI of 413% with Dataiku. Plus, 80% time savings on manual processes, reduced costs, and improved decision making on key business activities. Get a copy of the full study to learn more.

  • CIO Trends #7: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • Urban Myths About Secure Coding

    Sponsored by: Veracode, Inc.

    Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.