Search Results for: Business-Continuity

A Computer Weekly buyer's guide to blockchain technology
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

TechTarget ComputerWeekly.com

CW Middle East Oct to Dec 2017
This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

TechTarget ComputerWeekly.com

In data privacy we trust: building a strong information protection strategy in the hybrid era
In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

TechTarget ComputerWeekly.com

Stop Using Passwords
Most passwords are insecure, either being too easy to guess, or too readily shared.But what if your organization didn’t need passwords? Download this e-book to learn how a passwordless authentication platform works and see how it could reduce cyber risk in your organization.

TOPICS: .NET
One Identity

DIY AI Assessment: Recognizing And Evaluating AI Use Cases With T-Systems
Despite the vast expanse of applications that could benefit from AI integration, the shortage of dedicated AI specialists often poses a bottleneck. This white paper aims to close the gap by enabling software development and operations professionals to effectively recognize AI use cases and perform initial assessments. Read on to learn more.

TOPICS: .NET
T-Systems

Continuous Governance to Secure your Enterprise
Identities and access need to be managed in order to meet compliance standards and endure the long-term security of your organization. This e-book describes how your organization can achieve secure, continuous compliance through an identity governance framework. Read on to learn more.

TOPICS: .NET
One Identity

The State of Software Supply Chain Security 2024
Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.

TOPICS: .NET
ReversingLabs

Computer Weekly – 5 December 2023: Technologies to support hybrid working
In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.

TechTarget ComputerWeekly.com

A Computer Weekly Buyers Guide to IoT
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).

TechTarget ComputerWeekly.com

MicroScope – July 2021: Life on the edge
With opportunities around edge computing on the up, we ask experts to weigh in on how the channel can approach using the tech to its advantage. Also discover how to encourage employees to take cyber security lessons seriously, and how collaboration is key to growth this year

MicroScope