Search Results for: security

CW APAC, April 2021: Trend Watch: IoT in India
In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.

TechTarget ComputerWeekly.com

Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition
In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environmentsts
In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics
In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.

TechTarget ComputerWeekly.com

The myth of email as proof of communication
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

TechTarget ComputerWeekly.com

CW Nordics - February-April 2021: Nordic startups aim to take the lead in pet tech advances
Nordic technology startups are looking to take pet tech mainstream following the acceleration of the industry during the coronavirus pandemic.

TechTarget ComputerWeekly.com

Safeguard Enables Convenient Secrets Management for DevOps
This white paper explores strategies for integrating DevOps with privileged access management (PAM) to tackle security challenges. It covers using vaulting technologies, fostering collaboration between security and development teams, and embedding security into DevOps workflows. Read the paper to learn how to bridge the gap between DevOps and PAM.

One Identity

SMBs Still Struggle to Quell Mobile Threats
Most SMBs feel they have a good handle on securing mobile devices and data, and many deploy mobile-specific security products. Yet there are still a wide range of mobile-based attacks on employees’ devices, apps, data, and network connections. Discover where SMBs are missing the target on mobile security spend in this infographic.

TOPICS: .NET
T-Mobile for Business

5 Things SASE Does that SD-WAN Can't
Secure access service edge (SASE) has emerged as a leading means of implementing network security. In this webcast, Cato Networks Vice President, Eyal Webber-Zvik, explores the benefits of SASE as a tool for securing modern networks, comparing it SD-WAN, and arguing for its superiority. Watch now to learn more.

TOPICS: .NET
Cato Networks