Computer Weekly – 3 December 2024: Curing cancer with computers
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we go behind the scenes at the Francis Crick Institute to find out how data science and AI support its groundbreaking medical research. As courts on both sides of the Atlantic target Google, we analyse the legal threats for Big Tech. And our latest buyer's guide examines cloud and object storage. Read the issue now.
Posted: 29 Nov 2024 | Published: 03 Dec 2024
|
|
|
CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE:
Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023
|
|
|
Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023
|
|
|
Endpoint security: Hybrid work changes the game
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not. In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.
Posted: 10 Dec 2021 | Published: 10 Dec 2021
|
|
|
Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.
Posted: 26 Apr 2021 | Published: 27 Apr 2021
|
|
|
Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
Posted: 16 Apr 2021 | Published: 20 Apr 2021
|
|
|
Who will win the world's biggest cloud contract?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Aug 2019
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 08 Feb 2021 | Published: 27 Oct 2017
|
|
|
Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 Oct 2017
|
|
|
The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016
|
|
|
Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER:
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009
|
|
|
eBook-- Defining an Email-Archiving Policy
sponsored by Symantec Corporation
EBOOK:
Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009
|
|
|
Top Five Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
DATA SHEET:
Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of
an email archiving system.
Posted: 26 Jun 2009 | Published: 15 Jan 2008
|
|
|
Hitchcock Schools Protects SQL Servers and Data with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY:
The IT group at Hitchcock is responsible for all the end-user devices, network equipment, and servers that support students, teachers, administrators, and education programs. Central to their mission is protecting data that resides on SQL servers. That would be a much bigger worry if it weren't for Replay AppImage.
Posted: 09 Jun 2009 | Published: 01 Jun 2009
|
|
|
Lloyd Gosselink Rochelle & Townsend Ensure Reliable, Constant, E-mail Services with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY:
The network administrators at Lloyd Gosselink Rochelle & Townsend, PC have taken many steps to ensure reliable, constant, e-mail services. Like any law firm, e-mail is a central application and protecting the e-mail system is a central function of information services. One of the most important steps was implementing Replay AppImage.
Posted: 09 Jun 2009 | Published: 01 Jun 2009
|
|
|
Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER:
This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008
|
|
|
Great Things Happen on the Road to Disaster Recovery
sponsored by AppAssure Software, Inc.
CASE STUDY:
In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.
Posted: 14 Apr 2009 | Published: 10 Apr 2009
|
|
|
AppAssure makes Network Administrator "Hero of the Day"
sponsored by AppAssure Software, Inc.
CASE STUDY:
Before implementing AppAssure's MailRetriever, Imagine's Exchange environment suffered unrecoverable corruption. During the ensuing downtime, the network administrators searched for a better backup solution. Imagine Schools now relies on MailRetriever for Exchange to backup Exchange, SQL servers, and school Web sites.
Posted: 09 Apr 2009 | Published: 09 Apr 2009
|
|
|
eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by TechTarget Security
EBOOK:
Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER:
Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008
|
|
|
Email Management Services (EMS)
sponsored by Dell MessageOne
PRODUCT LITERATURE:
Email Management Services provide a total solution for email and BlackBerry® continuity, recovery, security, archiving, e-Discovery, and storage management.
Posted: 03 Jul 2008 | Published: 01 Jul 2008
|
|
|
What's New in BlackBerry® Enterprise Server v4.1 with Service Pack 5 for Microsoft® Exchange
sponsored by BlackBerry
WEBCAST:
View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange.
Posted: 12 Mar 2008 | Premiered: Mar 12, 2008, 09:00 EDT (13:00 GMT)
|
|
|
Secure Enterprise e-mail Solutions with Microsoft® Exchange
sponsored by OnX USA LLC
PRODUCT LITERATURE:
This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.
Posted: 20 Feb 2008 | Published: 01 Dec 2003
|
|