Cyber Security Enhancement Act of 2002 Reports

Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.
Posted: 16 Feb 2024 | Published: 20 Feb 2024

TechTarget ComputerWeekly.com

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

Top trends shaping APAC's tech landscape in 2024
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
Posted: 07 Jan 2024 | Published: 08 Jan 2024

TechTarget ComputerWeekly.com

MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE: In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023

MicroScope

What is Incident Response? Plans, Teams and Tools
sponsored by AT&T Corp
EGUIDE: Many experts use the terms incident response and incident management interchangeably, but the two are hardly the same. So, what is incident response? And what are the essential elements you need to know for protecting your organization? Read this e-guide to find out.
Posted: 18 Sep 2023 | Published: 29 Feb 2024

TOPICS:  Cybersecurity
AT&T Corp

2023 IT Priorities APAC Report
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.
Posted: 14 Apr 2023 | Published: 14 Apr 2023

TechTarget ComputerWeekly.com

Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.
Posted: 27 Mar 2023 | Published: 28 Mar 2023

TechTarget ComputerWeekly.com

CW EMEA - November 2023: Let the data flow
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.
Posted: 06 Nov 2023 | Published: 09 Nov 2023

TechTarget ComputerWeekly.com

How to Perform a Cybersecurity Risk Assessment in 5 Steps
sponsored by Koris365
EGUIDE: What is at the heart of a cybersecurity risk assessment? Find out by browsing this expert TechTarget guide on How to Perform a Cybersecurity Risk Assessment in 5 Steps. Inside, the guide provides can’t-miss advice on how to conduct these assessments in your business.
Posted: 25 Jul 2022 | Published: 21 Jul 2022

TOPICS:  Cybersecurity
Koris365