CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE:
Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023
|
|
|
Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022
|
|
|
MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE:
With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022
|
|
|
MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE:
In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022
|
|
|
MicroScope – January 2022: Squaring up to ransomware
sponsored by MicroScope
EZINE:
In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
Posted: 06 Jan 2022 | Published: 07 Jan 2022
|
|
|
CW APAC, April 2021: Trend Watch: IoT in India
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
Posted: 26 Apr 2021 | Published: 26 Apr 2021
|
|
|
Europe's controversial digital vision for the next decade
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 08 Feb 2021 | Published: 16 Jun 2020
|
|
|
Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 08 Feb 2021 | Published: 09 May 2019
|
|
|
Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Mar 2019
|
|
|
Oracle - Autonomous computing that declines a special name
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.
Posted: 08 Feb 2021 | Published: 16 Nov 2018
|
|
|
Jargon buster guide to database management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.
Posted: 08 Feb 2021 | Published: 05 Jul 2018
|
|
|
Data protection: Not just about personal data and compliance
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 08 Feb 2021 | Published: 18 Apr 2017
|
|
|
CW Europe: December 2016 - February 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 08 Feb 2021 | Published: 15 Dec 2016
|
|
|
Trouble at your door: targeted cyber attacks in the UK and Europe
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 08 Feb 2021 | Published: 29 Sep 2016
|
|
|
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER:
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008
|
|
|
Using Encrypting File System to Protect Microsoft Dynamics CRM Data on a V3c Client Running Windows XP Professional
sponsored by Microsoft
WHITE PAPER:
This white paper explains how to use Encrypting File System (EFS), a feature that is provided by default in the Windows® operating system, to protect data in Microsoft Dynamics CRM clients for Outlook Compatibility Update running on Windows XP Professional Service Pack 2 (SP2).
Posted: 25 Aug 2009 | Published: 28 Jun 2007
|
|
|
Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT:
This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
Posted: 09 Jun 2009 | Published: 06 May 2009
|
|
|
Customer Success Story: Sony Online Replaces Oracle with EnterpriseDB
sponsored by EnterpriseDB Corporation
CASE STUDY:
Read this customer success story to discover why Sony Online Entertainment replaced it's existing Oracle database solution with EnterpriseDB's Postgres Plus® Advanced Server, providing enhanced performance, scalability, and cost savings.
Posted: 28 Apr 2009 | Published: 29 Apr 2009
|
|
|
BMC Software Hybrid Copy Techniques
sponsored by BMC Software, Inc.
WHITE PAPER:
Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage.
Posted: 17 Apr 2009 | Published: 17 Apr 2009
|
|
|
Data Loss Prevention Survey
sponsored by Symantec Corporation
ASSESSMENT TOOL:
Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
|
|
|
Faster Application Development via Improved Database Change Management
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER:
Embarcadero® Change Manager puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team.
Posted: 01 Apr 2009 | Published: 27 Mar 2009
|
|
|
Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER:
Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009
|
|
|
Take Advantage of Oracle's 2 Day DBA Course
sponsored by Oracle Corporation
TRAINING GUIDE:
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions.
Posted: 25 Feb 2009 | Published: 25 Feb 2009
|
|
|
Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER:
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
IBM Security Event and Log Management Service
sponsored by IBM
SERVICE LISTING:
With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|