Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=10"
-
A Computer Weekly buyer's guide to anti-ransomware
Sponsored by: TechTarget ComputerWeekly.comThe threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
CW APAC, July 2020: Trend Watch: Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
-
CW Middle East Oct to Dec 2017
Sponsored by: TechTarget ComputerWeekly.comThis year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.
-
CW ASEAN: Trend Watch – Security
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
-
GEP Outlook 2024
Sponsored by: GEPRecent years have had businesses struggling with a myriad of challenges, risks, and concerns, especially for procurement and supply chain leaders. So, how are companies transforming? What trends can you expect going into the new year and how can you best keep up? Browse the report to learn more.
-
Jargon Buster Guide to Unified Communications
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
-
The DevSecOps Playbook Practical Steps for Producing Secure Software
Sponsored by: Veracode, Inc.What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.
-
The DevSecOps Playbook
Sponsored by: VeracodeThis e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.
-
Transforming software development with generative AI Develop faster and more securely with Amazon CodeWhisperer
Sponsored by: AWSThe eBook “Transforming Software Development with Generative AI” addresses the challenges faced by development teams as organizations make greater use of software to transform their businesses. The solution for many dev teams is Amazon CodeWhisperer, the real-time generative artificial intelligence (AI) coding companion.
-
Artificial intelligence in ITSM: Finding the right tools for you
Sponsored by: TechTarget ComputerWeekly.comAI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.