Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"
-
In 2017, the insider threat epidemic begins
Sponsored by: TechTarget ComputerWeekly.comCyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
CW EMEA - January 2023: Protecting the privacy of schoolchildren
Sponsored by: TechTarget ComputerWeekly.comIn this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
-
Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
Sponsored by: TechTarget ComputerWeekly.comThe Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.
-
The gender pay gap
Sponsored by: TechTarget ComputerWeekly.comThis survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How Encryption Has Made Your Websites More (and Also Less) Secure, and What to Do About It
Sponsored by: ZscalerEncryption has both improved and reduced website security. While it protects data confidentiality, it also hides evolving cyber threats. This report explores how leading providers address this challenge and offers recommendations to secure encrypted traffic. Read the full Analyst Report to learn more.
-
Computer Weekly - 9 March 2021: Are you ready to return to the office?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a year after lockdown began, we look at employers' changing attitudes to returning to the workplace. We find out how the software developer community has coped during the Covid-19 pandemic. And we examine the cyber security concerns prompted by latest social media craze, Clubhouse. Read the issue now.
-
Cyber Help (And Hope) For K-12 Targets
Sponsored by: SonicWallBecause K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.
-
Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.