Severe Acute Respiratory Syndrome Reports

Preparing the Enterprise for a Pandemic
sponsored by Avaya Inc.
WHITE PAPER: This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response.
Posted: 09 Jun 2008 | Published: 01 Sep 2006

Avaya Inc.

Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK: IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

CW ANZ – Jan 2019: Keeping pace with microservices
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Infographic: 5 questions to ask when creating a ransomware recovery plan
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
Posted: 25 Oct 2021 | Published: 25 Oct 2021

TechTarget ComputerWeekly.com

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Focus: how to avoid being hit by ransomware
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
Posted: 08 Feb 2021 | Published: 18 May 2017

TechTarget ComputerWeekly.com

Guide to Flexible Working
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 08 Feb 2021 | Published: 07 Apr 2016

TechTarget ComputerWeekly.com

Threat management: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 08 Feb 2021 | Published: 25 Nov 2016

TechTarget ComputerWeekly.com