Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=10"
-
The Secure Coding Handbook
Sponsored by: VeracodeThis 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
-
Transform your applications with Red Hat OpenShift Service on AWS
Sponsored by: Red HatDiscover how to modernize your applications and IT operations with a hybrid cloud platform. Learn to rapidly build, deploy, and manage cloud-native apps across on-premises and cloud environments. Read the e-book to unlock new business possibilities.
-
Amsterdam datacentre industry at a moment of reckoning
Sponsored by: TechTarget ComputerWeekly.comThe Netherlands is a fast growing datacentre location, as you can also read in this e-guide, and these constructions are taking up a lot of space and putting pressure on the local electricity grid. Read more about this and more in this e-guide.
-
How transport and logistics organisations can build agile and cyber resilient operations
Sponsored by: VodafoneIn this eBook, you’ll learn about what issues transport and logistics organizations are facing, key trends that are impacting the sector, and how technology can help these firms be better prepared to overcome the challenges of today and the future. Read the eBook here.
-
Launch, differentiate, and grow your business on AWS
Sponsored by: AWSDiscover how AWS enables ISVs to build, market, and scale innovative applications. Leverage the most comprehensive set of AI, ML, and security services to drive technical advances, expand reach, and boost productivity. Learn more about building modern applications on AWS.
-
The CISO Guide to Ransomware Prevention
Sponsored by: Checkpoint Software TechnologiesOver the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.
-
How to Evaluate Threat Intelligence Feeds
Sponsored by: ReversingLabsKnow When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.
-
A Computer Weekly Buyer's Guide to Enterprise Open Source
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.
-
Cracking the Buyer’s Journey with Intent Data
Sponsored by: TechTargetTake a look through this e-book to discover 5 significant changes in IT buyers’ behavior and how your organization can leverage intent data in order to improve your content for and outreach to those buyers.
-
Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
Sponsored by: XtelligentMedia HealthcareThe collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.