Homeland Security Presidential Directive No. 7 Reports

U.S. FTC Safeguards Rule
sponsored by Cisco
WHITE PAPER: The Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” - in other words, protection against data breaches, data leakage, phishing, and ransomware. Learn how Cisco Umbrella supports compliance in this white paper.
Posted: 23 Feb 2024 | Published: 23 Feb 2024

TOPICS:  Security
Cisco

2024 Generative AI Survey EMEA
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: Business stakeholders, IT professionals, data scientists, and end users continue to weigh the benefits, use cases, and best practices of generative AI (GenAI) against concerns with AI ethics and hallucinations. TechTarget's Enterprise Strategy Group aims to cut through this distracting noise, in our just-launched 2024 Generative AI Pulse Study.
Posted: 16 May 2024 | Published: 17 May 2024

TechTarget ComputerWeekly.com

Supercharging Employee Growth and Development
sponsored by ServiceNow
WHITE PAPER: Business Leaders are finding that focusing on skills, rather than jobs or degrees, strengthens your workforce with modern data and insights. This paper presents four ways that a skills-powered approach can supercharge employee growth and development.
Posted: 06 Oct 2023 | Published: 06 Oct 2023

TOPICS:  IT Management
ServiceNow

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 8 August 2023: How to improve developer productivity
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide examines the developer experience and looks at how critical it can be for productivity. The tech sector still struggles with diversity and inclusion – we ask what's standing in the way of ethnic minorities making it to the top. Read the issue now.
Posted: 04 Aug 2023 | Published: 08 Aug 2023

TechTarget ComputerWeekly.com

Computer Weekly – 7 November 2023: How ExxonMobil is leading with data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

Computer Weekly – 15 August 2023: How does your salary stack up?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual salary survey, comparing IT professionals' pay and attitudes to their job – how does yours stack up? The new digital chief at DWP discusses AI, data modernisation and shaking up the tech behind the benefits system. Read the issue now.
Posted: 11 Aug 2023 | Published: 15 Aug 2023

TechTarget ComputerWeekly.com

The Holistic Identity Security Maturity Model
sponsored by CyberArk
WHITE PAPER: Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk

Employees are Choosing How They Work
sponsored by Dell Technologies and Intel
EGUIDE: Read this e-book to gain guidance on how to establish an employee-centric digital workplace, including must-see security considerations for which everyone is responsible.
Posted: 10 May 2023 | Published: 10 May 2023

TOPICS:  IT Management
Dell Technologies and Intel