Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=20start=20start=10"
-
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
Sponsored by: TechTarget ComputerWeekly.comSchiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
-
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
Sponsored by: TechTarget ComputerWeekly.comSchiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
-
AI tools for software developers: Part Two
Sponsored by: TechTarget ComputerWeekly.comThe Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
-
InFocus: IBM
Sponsored by: IBMAs part of Canalys’s series of “InFocus” reports, Canalys assessed IBM’s global channel strategy and performance, while considering the implications for partners moving toward AI and hybrid cloud. Read on to learn why the report proclaimed IBM as well-positioned to offer business partners deep collaboration and support.
-
Best practices for remote data backups
Sponsored by: TechTarget ComputerWeekly.comThis guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.
-
Mobilizing a Zero Trust Security Model
Sponsored by: OktaAs organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
Why zero trust is IT security's best hope
Sponsored by: TechTarget ComputerWeekly.comThis guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
-
The State of ‘Security by Design’
Sponsored by: BrivoIs security an afterthought in building design? In order to answer this question and understand the state of security by design, Brivo commissioned a study involving 800 decision-makers deeply entrenched in the realms of architectural or engineering processes. Read on to learn more.
-
Simplifying IT Deployments at the Edge for Healthcare
Sponsored by: Schneider ElectricDiscover in this white paper how the 3 key pillars for successful edge computing deployments can help your healthcare IT deliver resiliency and reliability.