Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY:
Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER:
This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007
|
|
|
CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE:
Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018
|
|
|
ecuring Civilian Agencies Next-Gen SIEM for Enhanced Protection
sponsored by CrowdStrike
WEBCAST:
Civilian organizations are increasingly being exposed to advanced threats. In this webcast, experts from CrowdStrike break down their mission to secure civilian agencies with next-gen SIEM for enhanced protection. Watch the webcast now to learn more about Falcon Next-Gen SIEM.
Posted: 23 Oct 2024 | Premiered: Oct 23, 2024
|
|
|
Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER:
Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024
|
|
|
Protecting Against Ransomware with a Comprehensive Cybersecurity Strategy for Detection and Prevention
sponsored by Merlin International
PRODUCT OVERVIEW:
Federal agencies face evolving cybersecurity threats, with ransomware posing a major risk. A comprehensive strategy requires more than just EDR solutions—it must include privilege management, cryptographic security, and data recovery. Read the solution brief to discover how an integrated approach can strengthen your ransomware defense.
Posted: 21 Mar 2025 | Published: 22 Mar 2025
|
|
|
Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER:
Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023
|
|
|
Achieve Cloud Application Resilience With Hyperfast Recoveries
sponsored by Commvault
WEBCAST:
While the cloud unlocks new possibilities, it also brings unprecedented complexity in terms of protecting your workloads. Watch this on-demand webinar to discover how Commvault Cloud Rewind enables reduced recovery costs, seamless discovery & mapping, and continuous protection.
Posted: 26 Mar 2025 | Premiered: Mar 26, 2025
|
|
|
A Practical Guide to Zero Trust Implementation in Multicloud Environments
sponsored by Connections
EBOOK:
Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
Posted: 19 Sep 2024 | Published: 20 Sep 2024
|
|
|
Securing your Microsoft 365 environment.
sponsored by Covenco
WHITE PAPER:
Securing your Microsoft 365 environment is crucial as hybrid work exposes users to increased cyber threats. This white paper details attack vectors targeting M365, the limitations of native security, and how an integrated security platform can provide comprehensive protection. Read the full white paper to learn how to enhance your M365 defenses.
Posted: 07 Feb 2025 | Published: 07 Feb 2025
|
|
|
Arctic Wolf Protects Breadth and Depth of Club’s Vast IT Environment
sponsored by Arctic Wolf
CASE STUDY:
Composing the Parramatta Leagues Club (PLC) are the Parra Leagues and the Parramatta Eels, a community club and a professional rugby league football club, respectively. So, how does the PLC secure its vast IT environment? Find out in this case study.
Posted: 22 Mar 2024 | Published: 22 Mar 2024
|
|
|
Build and Operate Secure Containerized Environments at Scale
sponsored by Amazon Web Services
EBOOK:
Learn how to build and operate secure containerized environments at scale. This eBook explores best practices for maximizing the benefits of containers while minimizing security risks. Get expert guidance on protecting your containerized applications and workloads.
Posted: 30 Oct 2024 | Published: 31 Oct 2024
|
|
|
Navigating and Protecting the World of Web-Based LLMs
sponsored by Google Cloud
WHITE PAPER:
As web-based LLMs spread, organizations must balance innovation with security. This white paper examines LLM vulnerabilities like prompt injections and overreliance, emphasizing that traditional application security methods remain relevant despite LLMs' probabilistic nature. Read to learn how to assess and protect your AI-enabled applications.
Posted: 21 Mar 2025 | Published: 21 Mar 2025
|
|
|
The Evolution of Ecommerce
sponsored by LexisNexis® Risk Solutions
WHITE PAPER:
PH
Posted: 03 Feb 2022 | Published: 03 Feb 2022
|
|
|
A Rapid Recovery from Ransomware.
sponsored by Covenco
CASE STUDY:
When a leading automotive business suffered a ransomware attack, Covenco rapidly recovered the customer's data, restoring business continuity within 48 hours. Learn how Covenco's Ransomware Recovery Service can protect your critical data. Read the full case study.
Posted: 07 Feb 2025 | Published: 07 Feb 2025
|
|
|
The Essential Guide to Zero Trust
sponsored by Splunk
RESOURCE:
In order to survive in the era of hybrid work and beyond, government agencies need a modern approach to security that looks beyond the traditional perimeter. Download this guide to learn how these agencies can leverage zero trust to decrease their reliance on network security and focus instead on securing users, assets and resources.
Posted: 17 Sep 2021 | Published: 17 Sep 2021
|
|
|
CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE:
Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
Unlocking the Future of Government Operations
sponsored by FCN
PRODUCT OVERVIEW:
Government agencies are adopting cloud technologies to capitalize on redundancy and failover capabilities, among other benefits. This FCN and Dell Technologies product overview examines hybrid cloud solutions built for government operations. Discover how FCN and Dell Technologies can transform your agency's cloud operations by reading on.
Posted: 12 Nov 2024 | Published: 13 Nov 2024
|
|
|
Protect Your Manufacturing Operation’s Network and Data
sponsored by Exabeam
WHITE PAPER:
Manufacturing facilities face rising cybersecurity threats, with ransomware attacks increasing for the third year. Exabeam's LogRhythm SIEM solution helps security teams detect threats faster, improve OT environment visibility, and scale for future challenges. Strengthen your manufacturing security and protect assets by reading this white paper.
Posted: 26 Mar 2025 | Published: 26 Mar 2025
|
|
|
Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022
|
|
|
CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by TechTarget ComputerWeekly.com
EZINE:
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Nov 2018
|
|
|
Balancing Requirements for Application Protection: Teams Desire Consolidation but Need Specialized Protection
sponsored by LevelBlue
ESG THOUGHT LEADERSHIP EBOOK:
Application environments are increasingly complex, with web apps cloud-resident, containerized, and API-driven. This has led to security challenges like tool sprawl, bot attacks, and DDoS. Learn how organizations are consolidating web application protection in this e-book.
Posted: 31 Jan 2025 | Published: 01 Feb 2025
|
All resources sponsored by LevelBlue
|
|
Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021
|
|
|
Cloudflare One for Data Protection
sponsored by Cloudflare
PRODUCT OVERVIEW:
Data occupies an increasingly important and complex role in the way modern organizations run, but as a result, it has become a primary focus for attackers. Cloudflare One’s data protection suite is built to stay at the forefront of these distinctly modern risks. Download this product overview to learn more.
Posted: 02 Feb 2024 | Published: 03 Feb 2024
|
|
|
Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017
|
|
|
Balancing Requirements for Application Protection
sponsored by Human Security
ESG THOUGHT LEADERSHIP EBOOK:
This Enterprise Strategy Group eBook examines how evolving web application environments have increased security challenges. It explores trends in DDoS, bot, and API attacks, and the need for consolidated web application protection. Read the eBook to learn how to better secure your web applications and APIs.
Posted: 05 Feb 2025 | Published: 06 Feb 2025
|
|
|
CleanINTERNET® for AWS CLOUD ENVIRONMENTS
sponsored by Centripetal Networks
PRODUCT OVERVIEW:
As critical infrastructure is moved to the cloud, enterprises must reckon with the increased risk that comes with their expanded attack surface. Centripetal’s CleanINTERNET service is designed to defend your assets from cyber threats by leveraging dynamic threat intelligence on a mass scale. Read on to learn more.
Posted: 28 Jun 2024 | Published: 28 Jun 2024
|
|