Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Oct 2020
|
|
|
Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
Posted: 08 Feb 2021 | Published: 13 Aug 2019
|
|
|
Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019
|
|
|
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016
|
|
|
Webroot Enterprise Spy Audit
sponsored by OpenText Security Solutions
TRIAL SOFTWARE:
Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007
|
|
|
Kaspersky Internet Security 7.0
sponsored by Kaspersky
TRIAL SOFTWARE:
Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007
|
|
|
Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
Posted: 10 Nov 2023 | Published: 14 Nov 2023
|
|
|
Computer Weekly – 25 February 2025: Rethinking the route to net zero
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our buyer's guide looks at the need to apply innovative and long-term thinking to cutting carbon emissions in IT. We find out how retailer Dunelm is benefiting from a scheme to attract, retain and support women in tech. And Volvo Cars explains why the future for its vehicles is software-defined. Read the issue now.
Posted: 24 Feb 2025 | Published: 25 Feb 2025
|
|
|
Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER:
In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020
|
|