Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"
-
Disaster recovery has never been so easy or important
Sponsored by: TechTarget ComputerWeekly.comDisaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.
-
How APAC enterprises can scale up their AI initiatives
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a look into the main trends for AI deployment in APAC, what are the best strategies for enterprises that are looking to scale up their AI initiatives, and how APAC firms are using AI to increase innovation and optimise business processes.
-
CW Benelux November 2019-January 2020: Dutch banks fight money laundering
Sponsored by: TechTarget ComputerWeekly.comDutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
-
Towards software-defined and cloud-native networking
Sponsored by: TechTarget ComputerWeekly.comAs networking equipment rapidly evolves to being software-defined and cloud-native, there is pronounced interest in products and services to accelerate service delivery, improve end-user experiences, and reduce infrastructure and operational costs in service delivery applications. Read more in this e-guide.
-
Public Sector Leaders Discuss IT Infrastructure
Sponsored by: Red HatIn this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.
-
The Threat Prevention Buyer’s Guide
Sponsored by: ZscalerThis Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.
-
10 Steps to Enhance the Agility, Security and Performance of Active Directory
Sponsored by: One IdentityMicrosoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.
-
Akamai Guardicore Segmentation PCI DSS Whitepaper
Sponsored by: Akamai TechnologiesA new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.
-
Arctic Wolf Security Operations 2024 Report
Sponsored by: Arctic WolfThis report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.
-
Computer Weekly – 6 September 2022: Out with the old at Asda
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.