Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
Top 10 telecoms stories of 2019
Sponsored by: TechTarget ComputerWeekly.comTo paraphrase the eternally wonderful Sesame Street: this year's telecoms industry has been brought to you by the number "5", and the letter's "G" and "H". Here is Computer Weekly's top 10 list of what was driving the telecoms industry during 2019.
-
CW ASEAN: Connect your people
Sponsored by: TechTarget ComputerWeekly.comUnified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.
-
A reference architecture for the IoE
Sponsored by: TechTarget ComputerWeekly.comAnalyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).
-
Email Security Buyer's Guide
Sponsored by: Checkpoint Software TechnologiesEmail is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
CW ANZ: Trend Watch – Security
Sponsored by: TechTarget ComputerWeekly.comWith regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
-
Driving a Brownfield SAP S/4HANA Transformation with Confidence
Sponsored by: Basis TechnologiesDiscover best practices for driving a successful SAP S/4HANA transformation, especially for enterprises with complex, customized Brownfield landscapes. Learn how to minimize risk, accelerate delivery, and unlock the full potential of your SAP investment. Read the research content to get started.
-
How to be Resilient Against Cybersecurity Issues in Higher Education.
Sponsored by: Schneider ElectricIncreasing ransomware attacks, shrinking IT teams: These are two of the many challenges that higher education institutions encounter on the road to stronger cybersecurity. Along with digging into those factors and their implications, this white paper explores how to level up a school’s security posture. Read on to unlock these insights.
-
Quarterly Ransomware Research Report
Sponsored by: CyberMaxxThis Q3 2024 ransomware report analyzes the latest trends, including a 2% decrease in attacks compared to Q2 and the rise of the Ransomhub group. The average cost of a data breach continues to grow, highlighting the need for robust security. Read the full report to stay informed on the evolving ransomware landscape.
-
The Top 5 Generative AI questions on every Chief Product Officer’s mind
Sponsored by: AWSThis AWS infographic, Top 5 Generative AI Questions on Every Product Team’s Mind, will further your understanding of this new technology and help you guide your customers to greater success with generative AI.