Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Focus: Health IT
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
At a time when the NHS is faced with unprecedented pressure, new technological solutions can help ease some of the strain. From apps to electronic records and artificial intelligence, technology is playing an increasingly important part in transforming the health service.
Posted: 08 Feb 2021 | Published: 01 Sep 2017
|
|
|
A Computer Weekly buyer's guide to asset management for hybrid IT
sponsored by Livingstone Group
EGUIDE:
Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.
Posted: 08 Feb 2021 | Published: 25 Mar 2019
|
|
|
Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 04 Jan 2021
|
|
|
Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 07 Jul 2020
|
|
|
Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022
|
|
|
Essential Guide: APAC women in cyber security
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
Posted: 04 Oct 2021 | Published: 04 Oct 2021
|
|
|
Top Healthcare Cybersecurity Predictions For 2024
sponsored by XtelligentMedia Healthcare
EGUIDE:
Industry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024.
Posted: 14 Feb 2024 | Published: 15 Feb 2024
|
|
|
Top Healthcare Cybersecurity Predictions For 2024
sponsored by XtelligentMedia Healthcare
EGUIDE:
Industry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024. Read more about it in this eGuide.
Posted: 12 Feb 2024 | Published: 12 Feb 2024
|
|
|
The Cloud Influence on GRC
sponsored by TechTarget Security
EBOOK:
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
Posted: 19 Sep 2024 | Published: 23 Apr 2014
|
|
|
Cloud: A security risk and opportunity
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.
Posted: 08 Feb 2021 | Published: 15 Jan 2018
|
|
|
Renewable Energy Solutions Brochure
sponsored by Panduit
PRODUCT OVERVIEW:
As solar and other renewable energy sources continue to gain in popularity and usage, it has led to an increase in renewable energy production facilities around the world. With this rise in production, one partner in particular has found a way to partner with both EPC’s and solar installers to help power the world. Read on to learn more about it.
Posted: 27 Jun 2023 | Published: 27 Jun 2023
|
|
|
Computer Weekly – 25 June 2024: A revolution in space
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to astronaut Tim Peake about the imminent revolution in space tech and what it means for IT leaders. AI is set to transform the movie industry – we hear what it means for the producers of the latest Mad Max film. And we find out about plans for Saudi Arabian smart city Neom. Read the issue now.
Posted: 24 Jun 2024 | Published: 25 Jun 2024
|
|
|
How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE:
Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 08 Feb 2021 | Published: 06 Oct 2016
|
|
|
Top 4 market forces impacting the cybersecurity strategies of software companies and investors
sponsored by Amazon Web Services
WHITE PAPER:
There are a number of shifts affecting how cybersecurity providers and investors are approaching the market, impacting what they invest in and what they bring to market to try to mitigate the threats of today and tomorrow.These shifts can be loosely grouped into four categories. Download this whitepaper to see what they are and how AWS can help.
Posted: 12 Dec 2024 | Published: 06 Jan 2025
|
|
|
Top 4 market forces impacting the cybersecurity strategies of software companies and investors
sponsored by AWS
EGUIDE:
There are a number of shifts affecting how cybersecurity providers and investors are approaching the market, impacting what they invest in and what they bring to market to try to mitigate the threats of today and tomorrow.These shifts can be loosely grouped into four categories. Download this whitepaper to see what they are and how AWS can help.
Posted: 23 Dec 2024 | Published: 23 Dec 2024
|
|
|
A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
CW APAC buyer's guide to cloud security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
Posted: 08 Feb 2021 | Published: 07 Mar 2019
|
|
|
Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016
|
|
|
Protect your attack surface
sponsored by Cloudflare
EBOOK:
As organizations expand digitally, they face new cybersecurity challenges. This e-book explores "Everywhere Security," a comprehensive approach to protect the attack surface across employees, applications, APIs, and networks. Learn strategies to minimize vulnerabilities, prevent compromise, and stop data exfiltration. Boost your security posture.
Posted: 11 Mar 2025 | Published: 11 Mar 2025
|
|
|
Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024
|
|
|
Outside Plant Broadband Construction Solutions
sponsored by Panduit
PRODUCT OVERVIEW:
Panduit's Outside Plant Broadband Solutions support fiber network deployment with 50+ years of expertise. The lineup includes bundling tools, harsh environment ID, grounding components, enclosures, stainless steel mounts, and optical fiber products, all designed for reliable outdoor performance. Discover tools that enhance installation efficiency.
Posted: 18 Mar 2025 | Published: 18 Mar 2025
|
|
|
CW Middle East: UAE faces IT recruitment challenge
sponsored by TechTarget ComputerWeekly.com
EZINE:
With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.
Posted: 08 Feb 2021 | Published: 13 Apr 2017
|
|
|
Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Mar 2019
|
|
|
Cyber security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 08 Feb 2021 | Published: 11 Apr 2017
|
|
|
Customer Experience Insights Guide
sponsored by ARG, Inc.
ANALYST REPORT:
According to a recent study, every year $98 billion is lost by companies failing to provide “simple” experiences that customers want. This report provides a complete breakdown of the current state of customer experience, looking at the key trends defining the modern customer’s demands. Read on to learn more.
Posted: 13 Sep 2023 | Published: 13 Sep 2023
|
All resources sponsored by ARG, Inc.
|