ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30"

  • IAM: Managing identity remains key to cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.

  • Maximize your data insights with AI

    Sponsored by: Dell Technologies

    In this e-book, explore how organizations are innovating to drive business outcomes, what's blocking them, and how they can take advantage of new technologies like generative AI as an innovation accelerator.

  • Three Trends Driving Health Care Supply Chain Reinvention

    Sponsored by: Advantus

    If you haven’t refreshed your plan for the post-COVID-19 environment, you’re not alone. 1 in 4 health care supply chain leaders still don’t have a strategic plan. Learn how the top organizations are reinventing the traditional health care supply chain to succeed under today’s financial pressures in this white paper.

  • Computer Weekly – 5 March 2024: Authorised access only – biometrics in the workplace

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

  • NVMe flash storage 101

    Sponsored by: TechTarget ComputerWeekly.com

    Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.

  • Pre-Webinar Checklist

    Sponsored by: BrightTALK by TechTarget

    From doctors to airline pilots, checklists are crucial to success for even the most skilled professionals. By following these simple best practices you can create a smooth webinar experience that will improve your program success. Download your copy of the “Pre-Webinar Checklist,” to get started.

  • How OpenTelemetry and Semantic Telemetry Will Reshape Observability

    Sponsored by: Honeycomb

    This white paper explores how OpenTelemetry and semantic telemetry are reshaping observability. It discusses the challenges of traditional telemetry, the benefits of semantic data, and how OpenTelemetry addresses the tradeoffs in observability. Read the full white paper to learn how these innovations can transform your observability practices.

  • Multi-Factor Authentication Deployment Guide

    Sponsored by: Okta

    Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.