Moving on Up
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We look at the problems implementing SAP S/4 Hana and speak to experts about how maximise success. We also explore the challenges of networking microservices. Our CIO interview is PayPoint CIO Jon Marchant.
These are also closely related to: "Moving on Up"
-
7 Security Questions, 7 Answers From a CISO
By: Evolving Solutions
Type: Blog
From a CISO’s perspective, what are the biggest security threats of the moment? This is one of the seven questions that Evolving Solutions’ CISO, Mike Burgard, tackles in this Q&A.
Read on to unlock his answer and to discover:
- Top priorities to keep in mind when speaking with clients about security
- How Burgard’s experiences as both a vendor and client factor into his role
- And more
-
Computer Weekly – 2 August 2022: How to create a datacentre capacity plan
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, planning datacentre capacity is a growing challenge – we ask the experts for the latest best practice. Victims of the Post Office IT scandal explain why they think they were targeted for speaking out. And we look at the digital skills gap in retail and find out how employers can source talent. Read the issue now.
Find more content like what you just read:
-
Breaking Down the Log4j2 Attack
By: Endace
Type: Webcast
In this webcast, Endace’s Michael Morris speaks with Cisco’s Value Chain Security Leader about the Log4j2 attack. Watch now to unlock a discussion about open-source software vulnerabilities, remediation strategies and more.
-
CW ASEAN November 2016
By: TechTarget Security
Type: Ezine
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
-
CIO Trends #7
By: TechTarget ComputerWeekly.com
Type: eGuide
Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.
-
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
-
Media Consumption Study 2017 UKI
By: TechTarget ComputerWeekly.com
Type: eGuide
The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.
-
MicroScope – June 2022: A return to face-to-face meetings
By: MicroScope
Type: Ezine
With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel
-
Media Consumption Study 2017 UKI Infographic
By: TechTarget ComputerWeekly.com
Type: eGuide
The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.
-
Key tips for coaching your webinar speakers
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
Nobody likes a dull webinar. Regardless of how exceptional your content is, if your presenter is boring or lacks confidence when conveying his or her message, your audience will eventually tune out. There goes your ROI! So, what should marketers do in advance of a speaking engagement? Tune in to this webinar to learn more.
-
MicroScope – January 2021: Looking forward to the future
By: MicroScope
Type: Ezine
In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success
-
Cloud & DevOps: a guide to becoming a software-centric organisation
By: TechTarget ComputerWeekly.com
Type: eGuide
Businesses are investing time and effort in building digitally-enabled services. In this e-guide we look at how businesses can transform their software development teams to deliver software efficiently and reliably.
-
Creating effective webinars: Marketing leader’s guide
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
Every marketer must create a B2B content mix that drives authentic connections with their core buyers. But, doing this is easier said than done. How can you understand your audience’s priorities and speak to their needs with content that stands apart from the rest? Watch this webinar to learn more.
-
Fail to prepare quality data, prepare to fail
By: TechTarget ComputerWeekly.com
Type: eGuide
Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".
-
Cloud & Outsourcing - Why Partnering Strategies Matter
By: IBM
Type: White Paper
Explore how outsourcing motivations have changed and why you should adapt your sourcing strategies to keep up.
-
How to elevate your content with compelling storytelling
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
To create compelling content, marketers must tell their brand stories effectively and creatively. The best B2B storytellers employ narrative and graphic techniques that emotionally appeal to buyers and inspire long-lasting waves of engagement. Watch this webinar to learn more.
-
Sale’s leader’s guide to lead development
By: TechTarget
Type: BrightTALK Webinar
Revenue development was conceived as a way to leverage one-to-many capabilities into more productive opportunity discovery. To learn from a leader who’s broken through, join TechTarget CMO John Steinert as he speaks with Michael Brown, head of Reltio’s Global Revenue Development organization.
-
5th edition of the latest trends and insights for CIOs, CTOs and CDOs.
By: TechTarget ComputerWeekly.com
Type: eGuide
Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.
-
CIO Trends #6
By: TechTarget ComputerWeekly.com
Type: eGuide
Read some of our most popular articles on issues faced by IT decision makers, such as how to get DevOps right in order to deliver digital transformation. We explore digital twins and how they could be used to optimise real-world industrial assets and whether Brexit uncertainty is still dominating digital leadership conversations across the UK.
-
Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.
-
CIO Trends #3
By: TechTarget ComputerWeekly.com
Type: eGuide
This guide offers a collection of our most popular articles for IT leaders during the last part of 2016, looking at what it takes to be a great CIO and how to get the most out of your IT budget.
-
Focus: Enterprise digital transformation
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at how businesses can stay on track through collaboration, innovation, listening to user needs and partnering with suppliers.
-
Is the Netherlands keeping up with modern pace of digital change?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.
-
Event recap: VMworld 2018 Europe
By: TechTarget ComputerWeekly.com
Type: eGuide
It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.
-
Real-time analytics extends the reach of its business value more and more
By: TechTarget ComputerWeekly.com
Type: eGuide
Organisations increasingly value data that is as current as possible. And there are other sectors where real-time data analytics and data visualisation are proving valuable. In this e-guide, we discuss how continuous real-time analytics, operating at sub-second speed, are finding real-world applicability across several industry sectors.
-
CW Europe – December 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
-
Enterprise Labeling a Supply Chain Strategic Imperative
By: Loftware
Type: White Paper
Access this in-depth white paper to discover how to implement integrated, data-driven labeling in your supply chain management strategy.
-
Cloud networking and CDN: How to get the best for your business
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).
-
Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs
By: TechTarget Storage
Type: eGuide
This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.
-
Infographic: 6 emerging trends in security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
-
Dutch organisations demand more from government
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
-
European Perceptions, Preparedness and Strategies for IoT Security
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
-
Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
By: TechTarget Security
Type: White Paper
Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
-
Creating a Network Endpoint Security Policy for Hostile Endpoints
By: TechTarget Security
Type: eGuide
Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
-
How Threat Intelligence Can Give Enterprise Security the Upper Hand
By: TechTarget Security
Type: eGuide
Attackers and threats on security are advancing at an alarming rate and many enterprises are not able to keep up. Take a look at this guide to learn more about threat intelligence and how it can be incorporating into your current security program.
-
SIEM IT Decision Center- Checklist #2
By: TechTarget Security
Type: eGuide
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
-
CW ANZ: Fix the weak links
By: TechTarget ComputerWeekly.com
Type: Ezine
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
-
What to think about when utilizing endpoint securities
By: TechTarget Security
Type: eGuide
There’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.
-
Enforcing Endpoint Security: Creating a Network Security Policy
By: TechTarget Security
Type: eGuide
As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them.
-
Endpoint Security IT Decision Center Handbook 1
By: TechTarget Security
Type: eGuide
Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.
-
Defining and Enforcing a Clear Mobile Device Security Policy
By: TechTarget Security
Type: eGuide
If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more.
-
Effective Ways to Search Log Files
By: TechTarget Security
Type: eGuide
Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
-
CW APAC, October 2021: Tech Career Guide
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
-
The various ways to fight new and emerging cybercrime
By: TechTarget Security
Type: eGuide
Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
-
Public Cloud Security Tips and Best Practices
By: TechTarget Business Analytics
Type: eGuide
This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.
-
EssentialEnterprise Mobile Device Security Controls and Policies
By: TechTarget Security
Type: eGuide
In this expert guide from SearchSecurity.com, find out what mobile security controls you need to consider when formulating an enterprise mobility strategy, so that you can reap the benefits of increased productivity and efficiency without putting your sensitive data at risk.
-
Top 10 cyber security stories of 2021
By: TechTarget ComputerWeekly.com
Type: eBook
Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
-
CW EMEA July 2023: Can we trust AI?
By: TechTarget ComputerWeekly.com
Type: Ezine
Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
By: TechTarget ComputerWeekly.com
Type: eGuide
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.