Presidential Decision Directive 63 Reports

The Automation Architect’s Handbook: Leading End-To-End Automation Journeys
sponsored by Red Hat
EBOOK: In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

Red Hat

Get the Greatest ROI From Your Strategic Initiatives
sponsored by ServiceNow
WHITE PAPER: The most effective way to thrive through unprecedented change is to get ahead of it. Read this e-book to learn how you can transform your digital operations and maximize ROI by enabling effective project and portfolio management on a single platform.
Posted: 18 Jan 2024 | Published: 18 Jan 2024

TOPICS:  IT Management
ServiceNow

CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023

TechTarget ComputerWeekly.com

AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023

TechTarget ComputerWeekly.com

Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
Posted: 18 Dec 2023 | Published: 19 Dec 2023

TechTarget ComputerWeekly.com

Computer Weekly – 13 February 2024: Intelligent defence – the role of data in the military
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK's fastest supercomputer. Read the issue now.
Posted: 12 Feb 2024 | Published: 13 Feb 2024

TechTarget ComputerWeekly.com

CW APAC: Tech career guide – women in IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.
Posted: 13 Dec 2022 | Published: 15 Dec 2022

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

CW EMEA – December 2023: Prepare for cyber war
sponsored by TechTarget ComputerWeekly.com
EZINE: When the war between Hamas and Israel began, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. Read the issue now.
Posted: 22 Nov 2023 | Published: 07 Dec 2023

TechTarget ComputerWeekly.com

The Holistic Identity Security Maturity Model
sponsored by CyberArk
WHITE PAPER: Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk