Cyber Security Enhancement Act of 2002 Reports

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

Top Healthcare Cybersecurity Predictions For 2024
sponsored by XtelligentMedia Healthcare
EGUIDE: Industry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024. Read more about it in this eGuide.
Posted: 12 Feb 2024 | Published: 12 Feb 2024

XtelligentMedia Healthcare

How to get started with SASE
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
Posted: 28 Sep 2022 | Published: 28 Sep 2022

TechTarget ComputerWeekly.com

CW Middle East - October-December 2022: Qatar strengthens cyber defences ahead of FIFA World Cup
sponsored by TechTarget ComputerWeekly.com
EZINE: Being the first Arab country to host the World Cup is pressure enough on Qatar, but there is also a massive cyber security challenge associated with any event of this magnitude. Read about its preparations. Also in this issue, find out about the unique challenges of hiring IT professionals in Saudi Arabia.
Posted: 03 Oct 2022 | Published: 13 Oct 2022

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Five Cybersecurity Tips for Every Type of Enterprise
sponsored by Hughes Network Systems
SURVEY REWARD: ph
Posted: 20 Apr 2023 | Published: 20 Apr 2023

TOPICS:  Cybersecurity
Hughes Network Systems

Computer Weekly – 13 February 2024: Intelligent defence – the role of data in the military
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK's fastest supercomputer. Read the issue now.
Posted: 12 Feb 2024 | Published: 13 Feb 2024

TechTarget ComputerWeekly.com

Can AI take education to a new level?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.
Posted: 20 Nov 2023 | Published: 21 Nov 2023

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
Posted: 04 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

Buyer's Guide for Data Protection and Cyber Resiliency Solutions
sponsored by Hitachi Vantara
BUYER'S GUIDE: Growing security risks, combined with complex IT landscapes, have made the job of protecting enterprise data challenging. Read "Buyer's Guide for Data Protection and Cyber Resiliency Solutions" to discover the right combination of tools to achieve reliable backups, faster recovery and enhanced cyber protection.
Posted: 23 Apr 2024 | Published: 23 Apr 2024

TOPICS:  Cybersecurity
Hitachi Vantara