Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=10"
-
Focus: Securing for the future
Sponsored by: TechTarget ComputerWeekly.com2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
-
How to build a machine learning model in 7 steps
Sponsored by: TechTarget ComputerWeekly.comOrganizations are implementing AI projects for numerous applications in a wide range of industries. But building a viable, reliable and agile machine learning model takes patience, preparation and perseverance. In this e-guide, we take a look into the main steps for building an efficient machine learning model.
-
CW APAC – October 2020: Trend Watch: Storage
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.
-
CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.
-
CW Benelux May 2018
Sponsored by: TechTarget ComputerWeekly.comGDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
-
Computer Weekly – 15 October 2024: A future of virtual collaboration
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how immersive technologies such as augmented and virtual reality are set to transform workplace collaboration. We look at how AI is helping to deliver improvements in customer experience. And we analyse the problems in the Post Office project to replace its troubled Horizon IT system. Read the issue now.
-
Why zero trust is IT security's best hope
Sponsored by: TechTarget ComputerWeekly.comThis guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
-
Data governance more important now than ever
Sponsored by: TechTarget ComputerWeekly.comAs organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
Decentralising datacentres: The new challenges of security at the edge
Sponsored by: TechTarget ComputerWeekly.comIn September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.