The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST:
SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008
|
|
|
Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY:
Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER:
This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007
|
|
|
Endace Video 11
sponsored by Endace
WEBCAST:
In discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.
Posted: 16 Mar 2023 | Premiered: Mar 16, 2023
|
|
|
Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
sponsored by XtelligentMedia Healthcare
EGUIDE:
The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
Posted: 23 Jul 2024 | Published: 23 Jul 2024
|
|
|
How to Build a Proactive Compliance Program with Identity Security
sponsored by CyberArk
EBOOK:
This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.
Posted: 20 Dec 2024 | Published: 01 Jan 2025
|
|
|
Implementing the NIST Cybersecurity Framework
sponsored by Hughes Network Systems
BLOG:
The NIST Cybersecurity Framework helps organizations manage cyber risk. Hughes aligns its solutions to the framework's core functions. Learn how Hughes can help your business implement the NIST framework to protect your network and data.
Posted: 03 Dec 2024 | Published: 09 Aug 2024
|
|
|
Computer Weekly – 15 May 2018: Will government IT be ready for Brexit?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the UK government struggles to get new IT systems up and running before Brexit, we examine the challenges ahead. We look at serverless computing and ask why this emerging cloud technology is so important. And we discuss the latest best practice in mobile strategy for SMEs. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.
Posted: 25 Jun 2021 | Published: 29 Jun 2021
|
|
|
First edition of Computer Weekly 1966
sponsored by TechTarget ComputerWeekly.com
EBOOK:
To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 08 Feb 2021 | Published: 09 Sep 2016
|
|
|
CW APAC - December 2020: Trend Watch on cloud infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE:
The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.
Posted: 08 Feb 2021 | Published: 17 Dec 2020
|
|
|
Metadata Harvesting
sponsored by Panzura
PRODUCT OVERVIEW:
This product overview examines metadata tagging in manufacturing, law enforcement, and utilities. It explains how extracting metadata from XML sidecar files can streamline storage, enhance searchability, and improve decision-making. Solutions like GRAU Data MetadataHub and Panzura Symphony are featured. Learn how metadata-driven storage optimizes.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
14% of Americans are responsible for 75% of the country's medical debt
sponsored by XtelligentMedia Healthcare
EGUIDE:
Certain populations bear the brunt of the nation's medical debt burden, even as leaders work to relieve debt and remove it from credit reports.
Posted: 21 Aug 2024 | Published: 21 Aug 2024
|
|
|
Securing Healthcare: Overcoming Cyber Threats Amid Limited Resources
sponsored by Commvault
TECHTARGET MEDIA:
Healthcare organizations face cybersecurity challenges due to staffing shortages and outdated systems, with 96% of hospitals using vulnerable technologies. This makes healthcare a prime target, leading to breach costs of $9.77 million. Read this Xtelligent paper to learn how integrated security solutions protect patient data and ensure resilience.
Posted: 19 Mar 2025 | Published: 20 Mar 2025
|
|
|
Cybercrime: A Multifaceted National Security Threat
sponsored by Google
WHITE PAPER:
This white paper explores cybercrime as a national security threat, examining its impacts, support of state-sponsored activities, and effects on critical infrastructure. It analyzes the evolving cybercrime ecosystem and offers recommendations for a comprehensive approach. Read the full paper to grasp the complexity of this issue.
Posted: 08 Mar 2025 | Published: 08 Mar 2025
|
|
|
Mobile World Congress 2019: The year 5G use cases got real
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we will examine some of the bigger themes that emerged over the course of Mobile World Congress 2019 - which now attracts over 100,000 people every year.
Posted: 08 Feb 2021 | Published: 12 Mar 2019
|
|
|
AI Accelerator For Microsoft Copilot Optimize Your Manufacturing Operation
sponsored by CBTS
PRODUCT OVERVIEW:
Discover how Microsoft Copilot can revolutionize your manufacturing operations. This overview explores how Copilot's AI capabilities can boost productivity, quality control, and customer service. Learn how to achieve unprecedented optimization and close skills gaps. Read the full content for more insights.
Posted: 27 Jan 2025 | Published: 28 Jan 2025
|
|
|
Top 10 Australian IT stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at how the country is harnessing cutting-edge technologies to solve problems, while paving the way for emerging areas such as open banking.
Posted: 08 Feb 2021 | Published: 07 Jan 2020
|
|
|
Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by TechTarget ComputerWeekly.com
EZINE:
German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 08 Feb 2021 | Published: 12 Dec 2019
|
|
|
What does cloud computing look like in 2016?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.
Posted: 08 Feb 2021 | Published: 15 Aug 2016
|
|
|
CW APAC, Sep 2021: Buyer's guide to robotic process automation
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape
Posted: 16 Sep 2021 | Published: 16 Sep 2021
|
|
|
CW APAC – October 2020: Trend Watch: Storage
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2020
|
|
|
CW Nordics August 2018
sponsored by TechTarget ComputerWeekly.com
EZINE:
In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 08 Feb 2021 | Published: 23 Aug 2018
|
|
|
ML Model Outperforms Standard Methods for Detecting Heart Attacks
sponsored by XtelligentMedia Healthcare
EGUIDE:
Researchers have developed a machine learning (ML) tool capable of using electrocardiogram (ECG) readings to detect and classify heart attacks more quickly and accurately than standard approaches. The model was able to accurately reclassify 1 in 3 patients with chest pain based on heart attack risk. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023
|
|
|
CW ANZ: Gearing up for 5G
sponsored by TechTarget ComputerWeekly.com
EZINE:
The potential benefits of 5G are certainly promising in Australia, which is seen as a test bed for 5G services with the country's dense cities and wide open spaces. In this edition of CW ANZ, we look at how Australia is ushering in 5G services and the industries that will get the most out of the technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Aug 2018
|
|
|
How to Plan for Tomorrow’s SOC, Today
sponsored by Palo Alto Networks
EBOOK:
Discover in this e-book the 5 Steps and 4 Keys to transforming security operations to combat advanced attacks and improve SOC efficiencies, so you can plan for tomorrow’s SOC, today.
Posted: 24 Apr 2024 | Published: 24 Apr 2024
|
|
|
Dutch organisations demand more from government
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
Posted: 08 Feb 2021 | Published: 09 Dec 2019
|
|