ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30start=10"

  • Anatomy Of Identity Based Attacks

    Sponsored by: Okta

    74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.

  • What Does a Good Trace Look Like?

    Sponsored by: Honeycomb

    What does a good trace look like? In this e-book by Honeycomb, learn about 7 key characteristics of a successful trace and review an example of good tracing.

  • A 7-Step Risk Assessment Framework For Cybersecurity Professionals

    Sponsored by: VikingCloud

    Cybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

  • MITRE ATT&CK, a guide for businesses in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

  • A Computer Weekly buyer's guide to managing paper processes

    Sponsored by: TechTarget ComputerWeekly.com

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

  • A Computer Weekly Buyer's Guide to Converged Infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how the technology cuts the numbers of discrete skills and associated costs while demanding that those who remain retrain to ensure they know how to manage all parts of the stack – and the organisation implements it with care and an understanding of the risks.

  • Ensuring Business Reliability and Reputation through Service-level Objectives

    Sponsored by: Nobl9

    Discover in this white paper why, instead of building their own SLO solutions in-house, many companies can benefit from working with vendors that deliver simplified, prebuilt platforms.

  • Celestica decreases time-to-hire through remarkable efficiency plays

    Sponsored by: GEM

    Celestica, a leader in design and manufacturing, struggled with brand awareness and sourcing niche engineering roles. By using Gem, they saw a dramatic decrease in time-to-fill, an 87% offer-accept rate, and improved visibility into their recruiting process. Read the full case study to learn how Gem empowered Celestica's recruiting team.

  • Extracting actionable data from banking malware

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.