Search Results for "open group computer weeklystart=20start=10start=30"
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
-
Maximize your data insights with AI
Sponsored by: Dell TechnologiesIn this e-book, explore how organizations are innovating to drive business outcomes, what's blocking them, and how they can take advantage of new technologies like generative AI as an innovation accelerator.
-
Three Trends Driving Health Care Supply Chain Reinvention
Sponsored by: AdvantusIf you haven’t refreshed your plan for the post-COVID-19 environment, you’re not alone. 1 in 4 health care supply chain leaders still don’t have a strategic plan. Learn how the top organizations are reinventing the traditional health care supply chain to succeed under today’s financial pressures in this white paper.
-
Computer Weekly – 5 March 2024: Authorised access only – biometrics in the workplace
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.
-
How To Deploy A Password Policy
Sponsored by: Specops SoftwareThis white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.
-
NVMe flash storage 101
Sponsored by: TechTarget ComputerWeekly.comFlash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
-
Pre-Webinar Checklist
Sponsored by: BrightTALK by TechTargetFrom doctors to airline pilots, checklists are crucial to success for even the most skilled professionals. By following these simple best practices you can create a smooth webinar experience that will improve your program success. Download your copy of the “Pre-Webinar Checklist,” to get started.
-
How OpenTelemetry and Semantic Telemetry Will Reshape Observability
Sponsored by: HoneycombThis white paper explores how OpenTelemetry and semantic telemetry are reshaping observability. It discusses the challenges of traditional telemetry, the benefits of semantic data, and how OpenTelemetry addresses the tradeoffs in observability. Read the full white paper to learn how these innovations can transform your observability practices.
-
Multi-Factor Authentication Deployment Guide
Sponsored by: OktaThreat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.