Search Results for: security

Fraud management: A perennial business issue
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

TechTarget ComputerWeekly.com

Hull University Teaching Hospital Improves Workflows with Real-Time Visibility of Assets
To help address rising incidents of chronic illness, an ageing population, more expensive drugs and a shortage of clinical staff, Hull University Teaching Hospitals NHS Trust, looks to new technology and is seen as a pioneering and innovative healthcare provider. In this case study, discover why they turned to Zebra for a new technology need.

TOPICS: .NET
Zebra Technologies

Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

TechTarget ComputerWeekly.com

Secure Efficient and Flexible Capacity Tier for Veeam Backups
PH

DataCore Software Corporation

Data Analytics in Healthcare: Opportunities & Challenges
In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

TechTarget ComputerWeekly.com

CW APAC: Trend Watch: Cloud networking
In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

TechTarget ComputerWeekly.com

CW Europe – September-November 2017
In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.

TechTarget ComputerWeekly.com

MicroScope – December 2019: Time for change
In this issue, we ask experts how they're approaching digital transformation to meet customers demand, and we look at whether the actions of the user should reflect on the accountability of the cloud provider

MicroScope

7 NAS encryption best practices to protect data
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

TechTarget ComputerWeekly.com

Analysis of the Linux Audit System
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.

TechTarget ComputerWeekly.com