Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER:
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008
|
|
|
Analyst: Application Detection and Response is an ‘emerging category
sponsored by Contrast Security
BLOG:
According to a recent IDC Market Note, Application Detection and Response (ADR) is an emerging category in cybersecurity. This blog post explores how Contrast Security's ADR solution can help security teams identify vulnerabilities, detect threats, and stop attacks targeting applications and APIs. Read the full blog post to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024
|
|
|
CW APAC - March 2020: Expert Advice: Security Operations Centre
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
Posted: 08 Feb 2021 | Published: 19 Mar 2020
|
|
|
What is Incident Response? Plans, Teams and Tools
sponsored by AT&T Corp
EGUIDE:
Many experts use the terms incident response and incident management interchangeably, but the two are hardly the same. So, what is incident response? And what are the essential elements you need to know for protecting your organization? Read this e-guide to find out.
Posted: 18 Sep 2023 | Published: 29 Feb 2024
|
|
|
15 steps to Building an Effective Emergency Response Plan with Mass Notification
sponsored by Mitel
BUYER'S GUIDE:
This guide outlines 15 steps to create an effective emergency response plan using mass notification systems. It covers stakeholder identification, team formation, scenario planning, and technology assessment. Prepare your organization for crises, ensure clear communication, and protect people and assets. Read the guide to enhance preparedness.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Sensible one-page thoughts on managing performance
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of short, digestible articles, written especially for Computer Weekly.
Posted: 08 Feb 2021 | Published: 28 Sep 2016
|
|
|
Evaluating the Pillars of Responsible AI
sponsored by Hitachi Pentaho EMEA
ESG RESEARCH REPORT:
As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.
Posted: 07 Feb 2025 | Published: 08 Aug 2024
|
|
|
Evaluating the Pillars of Responsible AI
sponsored by Hitachi Pentaho
ESG RESEARCH REPORT:
As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.
Posted: 08 Aug 2024 | Published: 08 Aug 2024
|
|
|
CW Buyer's Guide to Emerging technology
sponsored by TechTarget ComputerWeekly.com
EBOOK:
The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022
|
|
|
Computer Weekly - 7 December 2021: Spy tech gets high tech – why MI6 invests in startups
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we're used to James Bond and his gadgets, but now MI6 is investing in tech startups to develop new intelligence capabilities. Our exclusive IT Priorities survey suggests IT leaders are optimistic about 2022. And our new buyer's guide examines the latest emerging technologies. Read the issue now.
Posted: 06 Dec 2021 | Published: 07 Dec 2021
|
|
|
Incident response and recovery services for UK businesses.
sponsored by IBM
BLOG:
Cyber incidents require rapid, integrated response to minimize impact. Learn how UK businesses can select an effective incident response service provider that goes beyond remote support. Read the full blog post to discover the benefits.
Posted: 07 Feb 2025 | Published: 07 Feb 2025
|
|
|
IDC MarketScape: Worldwide Emerging Managed Detection and Response Services 2024 Vendor Assessment
sponsored by LevelBlue
ANALYST REPORT:
This IDC MarketScape report examines the managed detection and response (MDR) services market, highlighting key capabilities and strategies of leading providers. It offers guidance for technology buyers to evaluate and select the right MDR partner. Read the full report to learn more.
Posted: 27 Aug 2024 | Published: 28 Aug 2024
|
All resources sponsored by LevelBlue
|
|
Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 08 Feb 2021 | Published: 15 Jul 2020
|
|
|
Top 10 ASEAN IT stories of 2017
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.
Posted: 08 Feb 2021 | Published: 15 Jan 2018
|
|
|
Top 10 Australian IT stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at how the country is harnessing cutting-edge technologies to solve problems, while paving the way for emerging areas such as open banking.
Posted: 08 Feb 2021 | Published: 07 Jan 2020
|
|
|
CISO Report Emerging trends
sponsored by Splunk
EBOOK:
CISOs and their boards are working more closely than ever. But their backgrounds are worlds apart, leading to gaps in priorities, goals, and success metrics. Learn how CISOs and boards can bridge the divide and build stronger, more productive relationships.
Posted: 20 Feb 2025 | Published: 20 Feb 2025
|
|
|
Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Mar 2020
|
|
|
Top 10 Australian IT stories of 2017
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to improve work productivity, upgrade its supercomputing infrastructure, harness the internet of things to improve business operations and realise its space ambitions.
Posted: 08 Feb 2021 | Published: 15 Jan 2018
|
|
|
Application Detection and Response (ADR): Helping SecOps teams address NIST CSF
sponsored by Contrast Security
INFOGRAPHIC:
This infographic explores how Application Detection and Response (ADR) can help security operations centers (SOCs) address the NIST Cybersecurity Framework, extending visibility into the application and API layer to identify and mitigate threats. Read the full infographic to learn more.
Posted: 14 Nov 2024 | Published: 15 Nov 2024
|
|
|
GigaOm Radar for Extended Detection and Response (XDR)
sponsored by NOKIA Intel
ANALYST REPORT:
This GigaOm Radar report examines 19 top XDR solutions, comparing their capabilities, emerging AI functions, and business criteria. It provides a forward-looking assessment to help decision-makers evaluate XDR offerings and make informed investments. Read the full report to learn how you can secure remote access and build user trust with XDR.
Posted: 23 Nov 2024 | Published: 02 Oct 2024
|
|
|
EMEA Emergency Services eBook: Fire & Rescue
sponsored by Ericsson
EBOOK:
Strong connectivity can be key to emergency services teams carrying out their jobs. In this e-book, access 5 teams’ stories of networking success and learn about the technologies that support it.
Posted: 30 Jan 2024 | Published: 30 Jan 2024
|
|
|
The benefits of Application Detection and Response
sponsored by Contrast Security
VIDEO:
In this video, Naomi Buckwalter, Senior Director of Product Security at Contrast Security, describes the blindspot security teams are grappling with: scant visibility into the application layer. Luckily, this is a blindspot that Contrast ADR eliminates.
Posted: 29 Jan 2025 | Premiered: 29 Jan 2025
|
|
|
Incident Response Service.
sponsored by Covenco
PRODUCT OVERVIEW:
Covenco's Incident Response service helps keep your business secure by providing a tailored incident response plan, testing, and execution. Learn how to improve your overall cybersecurity and meet compliance requirements. Read the full datasheet to discover the benefits.
Posted: 07 Feb 2025 | Published: 07 Feb 2025
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
CW APAC: Trend Watch - business response to coronavirus
sponsored by TechTarget ComputerWeekly.com
EZINE:
With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal.
Posted: 08 Feb 2021 | Published: 14 May 2020
|
|
|
Computer Weekly – 14 May 2019: The startups transforming data analytics
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we travel to Silicon Valley to meet the emerging tech startups hoping to take data analytics to a new level. The NHS desperately needs to recruit IT professionals – we look at the job opportunities. And we examine the best ways to keep cloud costs under control. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 May 2019
|
|