Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
Digital identity strategies to enhance data privacy and protect networks
Sponsored by: TechTarget ComputerWeekly.comThe rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
-
Cloud Security Your Developers Will Love
Sponsored by: CyberArkAs organizations move to the cloud, they seek consistent, developer-friendly controls that secure their access to cloud-based workloads and SaaS applications without slowing their productivity down. Access this e-book to learn more.
-
Data integration to support modern BI and advanced analytics programmes
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.
-
Middle East focus: Moving to the cloud
Sponsored by: TechTarget ComputerWeekly.comAccording to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
MicroScope – May 2023: Vendors need to listen and learn
Sponsored by: MicroScopeIn this month's MicroScope ezine, we look at why it is vital that vendors listen to partners and act on the feedback. We also look at what's next for HP's advancing sustainability programme, Amplify Impact. Read the issue now.
-
Computer Weekly – 6 September 2022: Out with the old at Asda
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.
-
Artificial Intelligence (AI) And The Future Of Application Security Testing
Sponsored by: VeracodeWith advances in AI capabilities, hackers have leveraged the evolving technology in order to perform more sophisticated attacks at scale. If actual attacks are using AI, then simulated attack testing that is performed at scale using AI is as close of a simulation to the real thing as one could hope for. Read on to learn more.
-
A Computer Weekly buyer's guide to applications of next-generation networking
Sponsored by: TechTarget ComputerWeekly.comThe race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses
-
Securing DevOps
Sponsored by: Veracode, Inc.Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.