Industrial Safety Reports

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com

Deloitte Global CIO Survey 2018 – UK Edition
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
Posted: 08 Feb 2021 | Published: 29 Aug 2018

TechTarget ComputerWeekly.com

Risk management is the beating heart of your cyber strategy
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Infrastructure optimisation for business application management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at some of the latest trends in server hardware design and specifications to help IT buyers make an informed choice about the best infrastructure to run their portfolios of business applications on.
Posted: 08 Feb 2021 | Published: 06 Jun 2018

TechTarget ComputerWeekly.com

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 08 Feb 2021 | Published: 12 Sep 2017

TechTarget ComputerWeekly.com

Audit Your Demand Generation Success: Part 3
sponsored by TechTarget
WHITE PAPER: Download this demand generation guide to understand the 4 stages of demand generation and the KPIs that go with them.
Posted: 08 Feb 2021 | Published: 25 Nov 2019

TechTarget

Computer Weekly - 5 November 2019: The benefits of API-first software development
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Nov 2019

TechTarget ComputerWeekly.com

Top 4 mobile security threats and challenges for businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Mobile is quickly becoming one of the most used endpoints in the enterprise. However, there is a common misconception that mobile devices don't need protection, which is just not true. In this infographic, we put together four of the top mobile security threats, and steps IT organizations can take to protect these critical endpoints.
Posted: 22 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com