EGUIDE:
The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
EZINE:
In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
WHITE PAPER:
Read this paper to learn how to eliminate common and repeated inquiries by giving employees a place to find their own answers, and provide an easy transition for those with more complex issues.
WHITE PAPER:
In this eGuide, you will hear that organizations depend on artificial AI and ML to forecast sales, segment their customer bases and identify risks. Download this guide and learn three Dell PowerEdge servers that have set world records in a benchmark specifically designed to provide real-world performance data on AI and ML workloads.
EZINE:
In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
EZINE:
Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
EZINE:
In this issue, we explore the need to handle pitches and collaboration carefully to create more opportunities as an increasing amount of IT spending goes via partners. Also discover Canalys' predictions for the use of generative AI, and just what exactly it means when we talk 'cyber security'
EZINE:
In this month's CW EMEA, we look at generative AI, which Accenture claims is the next big thing in enterprise IT. We also look at a demo of multi-supplier non-real-time RAN optimisation, a Ryder Cup tech testbed, and how Zurich Insurance has cut the time it takes to develop ServiceNow apps. Read the issue now.