Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"
-
Build a Better Webinar: Recruiting and Prepping Speakers
Sponsored by: BrightTALK by TechTargetTo produce a successful webinar, you need an effective speaker. However, presenting key information in a clear, concise, and engaging way can sometimes be easier said than done. Access this guide for essential tips and tricks for prepping and recruiting your webinar speakers.
-
Defining and Using Master Data Management
Sponsored by: Rackspace TechnologyPH
-
Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform
Sponsored by: CyberArkEnjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.
-
Shields up! Why Russia's war on Ukraine should matter to security pros
Sponsored by: TechTarget ComputerWeekly.comThe build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
-
The Buyer's Guide to Complete Cloud Security
Sponsored by: CrowdStrikeTo combat the sheer volume and evolving sophistication of modern cloud attacks, organizations need to take a smarter and faster approach to cloud security. This buyer’s guide captures the definitive criteria for choosing the right cloud-native application protection platform (CNAPP) and partner.
-
The Operational Efficiency of Hybrid Cloud Deployments and Management
Sponsored by: NutanixThis Enterprise Strategy Group technical validation examines how Nutanix Cloud Clusters (NC2) provides repeatable automation, simplifies workload management, and improves TCO and agility for hybrid cloud deployments. Learn more in the full report.
-
Public Sector Cyber Defense Guide
Sponsored by: CyberMaxxCyberattacks on public sector entities are growing in complexity and frequency. To stay secure in the future, organizations should consider adopting a defense-in-depth approach. Download this full e-book now to discover detailed strategies to fortify your cybersecurity efforts.
-
The ultimate enterprise SIP buyer’s guide
Sponsored by: SinchExplore the benefits of cloud-based SIP trunking for your enterprise, including cost savings, enhanced collaboration, and improved scalability. Discover if SIP trunking is the right solution for your business needs. Read the full guide to learn more.
-
7 Compelling Reasons Why Analysts Recommend SASE
Sponsored by: Windstream CommunicationsIn order to keep up with the evolving security landscape, analysts recommend SASE for its convergence of networking and security, gradual migration path, and ability to future-proof businesses. Access the e-book to discover more.
-
Virtual currencies and their potential role in cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.