Search Results for: Business-Continuity

2024 Guide To Ai-First Digital Procurement Transformation
Today, digital transformation has evolved past simply adopting new technologies; it’s become a necessary step to enhance your organization’s procurement processes. However, the current procurement landscape is uncertain, and many companies are hesitant to transform, especially without guidance. Browse this guide to learn more.

TOPICS: .NET
GEP

Digital experience focus broadens to encompass employees
This e-guide to employee experience includes a podcast discussion about the evolution of employee experience management. Also, we explore how advanced companies are responding to skills shortages and millennial employee attitudes by listening harder to their workforces.

TechTarget ComputerWeekly.com

eBook Data Governance and Compliance
As AI becomes essential for business, effective governance is crucial for managing risks and aligning initiatives. This e-book explores how Microsoft Purview can enhance data security, compliance, and governance to drive business value through data insights. Read the full e-book to learn more.

Zones, Inc.

Examining how cyberattacks affect patient care
Surveyed healthcare security practitioners reported several negative effects of cyberattacks on patient care, including patient safety and care delivery risks.

XtelligentMedia Healthcare

Fraud management: A perennial business issue
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

TechTarget ComputerWeekly.com

Simplify Cloud Security with Red Hat and AWS
Secure your hybrid cloud with consistent security policies across Red Hat Enterprise Linux and AWS. Learn how to mitigate risks, implement layered security, and streamline compliance. Download this product overview to discover the integrated security capabilities.

Red Hat

The DevSecOps Playbook
This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

Veracode

The DevSecOps Playbook Practical Steps for Producing Secure Software
What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

Veracode, Inc.

MicroScope – June 2021: A hybrid working world
With hybrid working set to become the norm as the world starts to return to a more normal footing post-Covid, we look at how businesses are preparing for the new world of work. Also discover how to tackle the sustainability challenge, and have some key questions answered around handling bottlenecks caused by large volumes of data

MicroScope

Computer Weekly – 2 August 2016: Giving fashion a digital makeover
In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.

TechTarget ComputerWeekly.com