ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • MicroScope – December 2023: What does the future hold for Industry 5.0?

    Sponsored by: MicroScope

    In this issue, we explore the future of Industry 5.0 to discover whether it's truly a tech revolution or just the next step in what has been promised since Industry 4.0. Also learn more about the risks and impacts of generative AI on data compliance and compliance, as well as seven steps you should take to engage customers while providing services

  • Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

  • Computer Weekly – 25 July 2023: Getting comfortable with data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.

  • Computer Weekly – 18 July 2023: Soaring ahead with data at Rolls-Royce

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how aerospace giant Rolls-Royce uses data to improve its competitive advantage. We examine the benefits and best practices in software-defined storage. And we analyse calls for a review of laws around the use of computer evidence prompted by the Post Office IT scandal. Read the issue now.

  • CW EMEA July 2023: Can we trust AI?

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.

  • Computer Weekly – 4 July 2023: How data is beating heart disease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.

  • 8 secure file transfer services for the enterprise

    Sponsored by: TechTarget ComputerWeekly.com 

    Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

  • Identity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • 5 types of data security

    Sponsored by: TechTarget ComputerWeekly.com

    Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.

  • Infographic: 5 cybersecurity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

  • A Computer Weekly buyer's guide to anti-ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.

  • CW Nordics - November 2022 - January 2023: Icelandic datacentres point way to greener IT

    Sponsored by: TechTarget ComputerWeekly.com

    Iceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients.

  • MicroScope – November 2022: Elevate security to minimise risk

    Sponsored by: MicroScope

    Security remains a major concern for customers and a continuing area of growth for the channel – so what can managed service providers do to help out? Also read about expectations for the last quarter of 2022 and how partnerships are key to digital transformation.

  • MicroScope – October 2022: 40 years of MicroScope

    Sponsored by: MicroScope

    As we celebrate MicroScope's 40 anniversary, we look back (and forward) to assess how the channel keeps changing, with experts weighing in with their opinions

  • CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT

    Sponsored by: TechTarget ComputerWeekly.com

    Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.

  • 5 endpoint security best practices

    Sponsored by: TechTarget ComputerWeekly.com

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

  • MicroScope – July 2022: The slow march to Windows 11

    Sponsored by: MicroScope

    It's taken a while, but the latest Microsoft OS is having an impact – read all about the journey to Windows 11, as well as the uptake of co-innovation and co-creation strategies in the channel, and Broadcom's acquisition of VMware

  • Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

  • MicroScope – June 2022: A return to face-to-face meetings

    Sponsored by: MicroScope

    With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

  • Infographic: 6 information governance best practices

    Sponsored by: TechTarget ComputerWeekly.com

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

  • Infographic: 6 file transfer best practices

    Sponsored by: TechTarget ComputerWeekly.com

    File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

  • MicroScope – December 2022: Dealing with rising prices

    Sponsored by: MicroScope

    With prices rising, many are looking at what costs to cut – yet in the channel, the opposite might prove for better business. In this issue, read about how to navigate the cost issue, learn about the growing area of security, and learn about how to create a more appealing employment experience to attract talent

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.