EBOOK:
In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
EGUIDE:
Since its beginnings nearly 40 years ago, the job of an organization's top IT executive has involved the cost-effective and strategic management of IT systems. But today's CIOs must also understand how IT drives business transformation.
EZINE:
In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
EGUIDE:
Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
EGUIDE:
The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
INFOGRAPHIC:
Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
EZINE:
In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
EGUIDE:
Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
EZINE:
In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
EGUIDE:
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.