IETF Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

Essential Guide to Software Defined Networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.
Posted: 08 Feb 2021 | Published: 12 Feb 2018

TechTarget ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT: The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 23 Nov 2024 | Published: 03 Oct 2024

NOKIA

Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT: The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024

NOKIA

The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016

TechTarget ComputerWeekly.com

Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

Kubernetes Networking and Cilium
sponsored by Cisco
EBOOK: Kubernetes networking can be daunting, even for seasoned network engineers. This e-book provides a detailed instruction manual on Kubernetes networking fundamentals, Cilium, and advanced features like load balancing, security, and observability. Download the e-book to master Kubernetes networking.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Cisco

DDoS Mitigation: Types of DDoS Attacks and Security Considerations
sponsored by Arbor Networks
EGUIDE: Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.
Posted: 08 Feb 2021 | Published: 27 Oct 2017

Arbor Networks

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.
Posted: 01 Sep 2023 | Published: 05 Sep 2023

TechTarget ComputerWeekly.com

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill