Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by TechTarget Search Windows Server
EZINE:
In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009
|
|
|
Firewall Buyers Guide
sponsored by Palo Alto Networks
BUYER'S GUIDE:
As network perimeters have evolved, firewalls have too. So, what constitutes a modern firewall? This buyer’s guide maps out 15 non-negotiable capabilities. Keep reading to access those insights and more.
Posted: 04 Apr 2024 | Published: 04 Apr 2024
|
|
|
Manufacturing Background Check Strategies for Faster Hiring
sponsored by Checkr
WHITE PAPER:
Streamline your manufacturing hiring process with AI-powered background checks. Learn how to create a seamless candidate experience, automate compliance workflows, and integrate with your HR tech stack. Read the full checklist to modernize your background screening.
Posted: 06 Feb 2025 | Published: 06 Feb 2025
|
|
|
Protecting Data Using Artificial Intelligence and Machine Learning
sponsored by Netskope
WHITE PAPER:
Discover how AI and machine learning enhance data protection in the cloud era. This white paper explores Netskope's advanced DLP solution, featuring image and document classification to detect sensitive information. Learn about innovative techniques like TYOC for customized data security. Read the white paper to stay ahead.
Posted: 27 Feb 2025 | Published: 28 Feb 2025
|
|
|
Outlining 11 typical types of medical mistakes and patient harms
sponsored by XtelligentMedia Healthcare
EGUIDE:
Understanding the most common types of medical errors might help tailor patient safety best practices.
Posted: 24 Oct 2024 | Published: 25 Oct 2024
|
|
|
Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK:
This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
The 5 Stages of CTEM
sponsored by XM Cyber
WHITE PAPER:
Increasingly, The Continuous Threat Exposure Management (CTEM) Framework by Gartner is being seen as an impactful way to address the full range of challenges that put organizations at risk. Read this white paper now to discover the 5 stages of CTEM and find out how you can change the way your business handles cyber risk.
Posted: 09 Jan 2025 | Published: 11 Jan 2025
|
|
|
Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER:
Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021
|
|
|
Strata Network Security Buyer’s Guide
sponsored by Palo Alto Networks
EBOOK:
In this e-book, discover the essential buyer’s guide to network security solutions, and the secrets to creating security RFPs that get results.
Posted: 31 May 2024 | Published: 01 Jun 2024
|
|
|
Truman Medical Centers/ University Health Charts Big Improvements In Clinician Communication And Satisfaction With Single Mobility Investment
sponsored by Zebra Technologies
CASE STUDY:
Giving nurses, doctors and other staff one key clinical mobile device has improved care team satisfaction by 35% – and that’s just one of the many benefits realized so far. Explore the benefits of a single mobility investment in this case study.
Posted: 10 May 2024 | Published: 10 May 2024
|
|
|
Build Solar Better Balance of System Solutions from PV Module to Transmission Line
sponsored by Panduit
PRODUCT OVERVIEW:
Explore Panduit's balance of system solutions for solar plants, from module to transmission. Featuring UV-resistant cable management, grounding, identification, and protection components for efficiency and reliability in harsh environments. Read this white paper to learn how BOS components can reduce downtime and maximize your solar project's ROI.
Posted: 17 Mar 2025 | Published: 18 Mar 2025
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
Zero-click two-factor authentication
sponsored by Sinch
EBOOK:
Explore how zero-click two-factor authentication can enhance security and user experience for financial services. Learn about innovative solutions like Data Verification and Flash Call Verification that streamline authentication without compromising protection. Read the full guide to discover how these methods can transform your processes.
Posted: 30 Aug 2024 | Published: 03 Sep 2024
|
|
|
AI-Powered DEM Solution Critical Capabilities Checklist
sponsored by New Relic
BUYER'S GUIDE:
Evaluate the critical capabilities needed for an effective AI-powered digital experience monitoring (DEM) solution. This checklist covers key factors to consider, from real-user monitoring to AI-driven optimization, to help you select the right DEM solution for your business. Read the full guide to power your digital strategy.
Posted: 16 Jan 2025 | Published: 16 Jan 2025
|
|
|
The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017
|
|
|
Why Passkeys Improve User Security & How To Implement Them
sponsored by FusionAuth
WHITE PAPER:
Passkeys offer a secure alternative to traditional passwords, reducing vulnerability to phishing and social engineering attacks. This white paper explores how passkeys work, their benefits over passwords, and best practices for implementation. Learn how passkeys can enhance security and user experience. Stay ahead in authentication technology.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Building a Future-Ready Workforce
sponsored by Censia, Inc
WHITE PAPER:
AI-enabled skills management offers scalable workforce planning amid rapid skill evolution. Discover how AI can future-proof your talent management strategy.
Posted: 18 Mar 2025 | Published: 19 Mar 2025
|
All resources sponsored by Censia, Inc
|
|
XDR Maximizing Operation Efficiency
sponsored by Bitdefender
EBOOK:
Streamlining security operations with automation and XDR can enhance efficiency, reduce risks, and empower security teams. In this e-book, you'll learn how to simplify incident response, leverage XDR, and implement best practices to strengthen your cybersecurity posture. Read on now to learn more.
Posted: 25 Feb 2025 | Published: 06 Mar 2025
|
|
|
Data discovery: how to pick the right software
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.
Posted: 08 Feb 2021 | Published: 20 Nov 2019
|
|
|
Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017
|
|
|
An Introductory Use Case Guide Splunk Artificial Intelligence for Observability
sponsored by Splunk
EBOOK:
Observability is a modern approach to monitoring that uses AI and ML to provide visibility and context across complex systems, increasing system security and reliability. In this guide, you’ll learn about Splunk’s observability solution through use cases across IT and OT domains.
Posted: 23 Jul 2024 | Published: 23 Jul 2024
|
|
|
Beti Bolsters Payroll Success
sponsored by Paycom
PRODUCT OVERVIEW:
Beti, a self-service payroll feature from Paycom, enables employees to manage, verify, and approve their paychecks before processing. This reduces payroll errors by over 80% and increases productivity for managers and HR teams. Read the full white paper to learn how Beti can streamline your payroll processes.
Posted: 19 Feb 2025 | Published: 20 Feb 2025
|
|
|
The DevOps Acceleration Blueprint: Choosing the Right CDN for Your Team
sponsored by Fastly
EBOOK:
This e-book explores how developer-friendly CDNs boost DevOps efficiency. It covers features like real-time configuration, edge computing, and integration. Learn about performance metrics, security, and customization to optimize content delivery. Discover how to choose the right CDN for your team. Enhance your DevOps strategy with this e-book.
Posted: 25 Feb 2025 | Published: 26 Feb 2025
|
|
|
The Island Enterprise Browser: A Comprehensive Solution for a Viable BYOD Policy
sponsored by Island
PRODUCT OVERVIEW:
Discover how the Island Enterprise Browser offers a comprehensive and viable solution for BYOD management. Learn how it simplifies provisioning, controls data leakage, and ensures user privacy - all while addressing the challenges of traditional BYOD approaches. Read the full white paper to learn more.
Posted: 07 Feb 2025 | Published: 07 Feb 2025
|
|
|
How to Plan for Tomorrow’s SOC, Today
sponsored by Palo Alto Networks
EBOOK:
Discover in this e-book the 5 Steps and 4 Keys to transforming security operations to combat advanced attacks and improve SOC efficiencies, so you can plan for tomorrow’s SOC, today.
Posted: 24 Apr 2024 | Published: 24 Apr 2024
|
|
|
ADM Market Insight: Automate SAP Testing With Opentext Functional Testing AI-Based Capabilities
sponsored by OpenText
EBOOK:
As enterprises migrate to SAP S/4HANA, extensive testing is crucial. This e-book explores how OpenText Functional Testing's AI-driven capabilities can help automate SAP testing, build resilient test assets, and reduce maintenance costs. Read the full e-book to learn more.
Posted: 17 Jan 2025 | Published: 17 Jan 2025
|
|