Search Results for: Business-Continuity

The changing mobile platform landscape
So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

TechTarget ComputerWeekly.com

Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

TechTarget ComputerWeekly.com

Privileged Access Management Maturity in the Cloud Era
It’s estimated that 80% of data breaches involve privilege misuse or compromise. Gartner lists Privileged Access Management (PAM) as a critical infrastructure service and a high-priority cyber defense capability. Read this white paper to learn more.

TOPICS: .NET
Saviynt

9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

TechTarget ComputerWeekly.com

Computer Weekly – 14 August 2018: Infrastructure under attack
In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

TechTarget ComputerWeekly.com

How to Develop Your EPM Strategy
While developing an enterprise performance management (EPM) strategy seems straightforward enough, it’s critical to consider the many processes, people, and systems involved before choosing which path to take. Browse this guide to learn more.

TOPICS: .NET
US Analytics

Computer Weekly - 10 September 2024: The flight to data success
In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

TechTarget ComputerWeekly.com

Computer Weekly – 13 April 2021: The evolution of RPA
In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly - 1 November 2022: How the pandemic accelerated tech adoption in hospitality
In this week's Computer Weekly, the hospitality sector was devastated by the pandemic, and it's turning to technology to rebuild – we find out what's changing. Google's cloud business is growing but remains well behind the market leaders – what does its future look like? And we look at the benefits of AIOps for storage. Read the issue now.

TechTarget ComputerWeekly.com