ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Work Smarter, Not Harder with Gemini in Security Operations

    Sponsored by: Google Cloud

    AI can transform security operations by enabling teams to create queries, conduct investigations, generate detections, summarize data, and build playbooks, regardless of experience. This session covers practical uses of Google Security Operations' AI. Watch the webinar to learn how AI enhances security.

  • 5 Impacts of Access on System Availability and Security

    Sponsored by: Claroty

    Market forces are increasingly pressuring industrial organizations to digitize and streamline operations, while attackers are adding pressure to keep operations secure. Watch this on demand webinar to learn the benefits of a Cyber-Physical Systems-specific solution for industrial organizations.

  • Computer Weekly – 1 April 2025: Inside Amazon's robot-powered warehouse

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at Amazon's robot-powered Swindon warehouse to see how AI and humans are working together. We also examine the state of open source licensing and find out how it's affecting datacentre operators. Read the issue now.

  • Best practices to boost security operations in 2025

    Sponsored by: Google Cloud

    In this webinar, access a blueprint for how to achieve a solid security operations center (SOC) strategy. Get a straightforward appraisal of what a good SOC looks like - and the building blocks of a plan to help get you there.

  • 2025 Technology Spending Intentions APAC

    Sponsored by: TechTarget ComputerWeekly.com

    Nearly half of organisations in APAC have bigger IT budgets this year, according to Informa TechTarget's Technology Spending Intentions study. Inside this report, APAC editor-in-chief, Aaron Tan, breaks down the top technology priorities of organisations in the region, plus read more about the major tech trends that are shaping buying decisions.

  • Unlocking Digital Performance | 2025 Outlook: Continuous Innovation For Measurable Business Results

    Sponsored by: Sutherland

    This paper outlines six building blocks for AI-first transformation. Read on to discover them.

  • Analyst Report Managed Detection And Response

    Sponsored by: Kaspersky

    Kaspersky's MDR report reveals 2024 cybersecurity insights. Read the report to understand the evolving threat landscape and strategies.

  • Guidelines For Secure Development And Deployment Of AI Systems

    Sponsored by: Kaspersky

    This e-book explores cybersecurity risks in AI systems, covering threat modeling, infrastructure security, data protection, and defense against ML-specific attacks. It offers practical recommendations for organizations implementing AI solutions. Read the e-book to establish effective security controls throughout your AI system lifecycle.

  • The Global State of CPS Security 2024: Secure Access

    Sponsored by: Claroty

    Claroty recently commissioned an independent global survey of 1,100 information security, OT engineering, clinical & biomedical engineering, and facilities management & plant operations professionals about the business impacts of cyberattacks on their organizations in the past 12 months. Read on now to uncover key insights.

  • Transform your data foundation

    Sponsored by: ServiceNow and Nexon

    In this video, you’ll learn how to maximize the full potential of your cloud strategy with a unified platform that simplifies compliance, security, and data integration. Tune in now to find out how you can drive faster, more efficient outcomes with the support of flexible cloud experts.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.