Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"
-
Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
-
Contact Center-as-a-Service MetriRank 2023
Sponsored by: 8x8In this analyst report, discover how the top-ranking CCaaS solutions stack up against the competition, and find out which solution is best for your enterprise.
-
CW APAC: Trend Watch: Cloud networking
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
A Computer Weekly buyer's guide to managing paper processes
Sponsored by: TechTarget ComputerWeekly.comModern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
Preventing identity theft in a data breach
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
A 4-Step Plan For Denial Prevention
Sponsored by: WaystarWhat do you do when staff don’t have the time, money, or resources to work denials as thoroughly as they’d like? The technology and tactics to prevent denials is here and you can unlock a proven approach to denial prevention. Get a step-by-step denial prevention plan in this e-book.
-
A Computer Weekly buyer's guide to robotic process automation
Sponsored by: TechTarget ComputerWeekly.comRobotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation
-
AI: Beyond the hype
Sponsored by: TechTarget ComputerWeekly.comArtificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?
-
Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce
Sponsored by: ZscalerThis in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.