CW Middle East Jan to Mar 2018
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 08 Feb 2021 | Published: 11 Jan 2018
|
|
|
CW EMEA: Keeping across the rules
sponsored by TechTarget ComputerWeekly.com
EZINE:
Saudi Arabia made a statement of intent back in 2017 that it would build an entirely new city that would be smart from the start. We go deeper to find out how the project is shaping up.
Posted: 18 Jul 2024 | Published: 18 Jul 2024
|
|
|
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006
|
|
|
Security for BlackBerry Devices with Bluetooth Wireless Technology
sponsored by BlackBerry
WHITE PAPER:
This document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.
Posted: 11 Aug 2006 | Published: 01 Aug 2006
|
|
|
CW APAC – Trend Watch: Modernising security operations
sponsored by TechTarget ComputerWeekly.com
EZINE:
Organisations everywhere know the risks of cyber security complacency. In this handbook, focused on modernising security operations in the Asia-Pacific region, Computer Weekly looks at how Australia is bolstering its defences, Splunk and Cisco’s integration, and Palo Alto Networks’ “precision AI”.
Posted: 12 Nov 2024 | Published: 12 Nov 2024
|
|
|
Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022
|
|
|
Computer Weekly – 6 August 2024: Migrating to S/4Hana – how the Co-op made its move
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's ezine, as SAP users prepare for the deadline to move off the ECC platform, we find out how Co-op is migrating to S/4Hana. Our latest buyer's guide looks at how to manage SaaS and on-premise software licensing. And we talk to former NCSC CEO Ciaran Martin about the true risks of nation-state cyber attacks. Read the issue now.
Posted: 02 Aug 2024 | Published: 06 Aug 2024
|
|
|
CW Europe - March-May 2022: Luxembourg sees big role in global fintech market
sponsored by TechTarget ComputerWeekly.com
EZINE:
Read about Luxembourg's aim to play a larger role in the rapidly growing global financial technology market. Also find out how a Siri-like digital assistant will automate the completion of government service requests in Estonia.
Posted: 28 Feb 2022 | Published: 10 Mar 2022
|
|
|
Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.
Posted: 17 Jun 2022 | Published: 21 Jun 2022
|
|
|
Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023
|
|