The CISO’s changing role in the digital age
By: Oracle and Intel® View more from Oracle and Intel® >>
Download this next:
Your comprehensive guide to the Fujitsu Group
By: Fujitsu
Type: eBook
Fujitsu promotes the “Fujitsu Way,” the principle for the behavior of its people centered on a single purpose, which sets out why Fujitsu exists in society. All Fujitsu employees will seek to create value by working every day in accordance with values - aspiration, trust, and empathy – and Fujitsu’s code of conduct.
But what is the Fujitsu Way, and what does it actually look like in practice for organizations looking to promote sustainable transformation?
Take a deep dive into Fujitsu’s inner workings in this comprehensive e-book.
These are also closely related to: "The CISO’s changing role in the digital age"
-
14 tips for successful digital transformation
By: TechTarget ComputerWeekly.com
Type: eGuide
What constitutes digital transformation success? From delivering a better customer experience, or increasing productivity, eliminating inefficiencies, ensuring compliance, the primary reason for migrating to a digital transformation environment must ultimately be to improve the business.
But realising those business benefits will not happen overnight, and will depend on many factors outlined in this infographic -- from the dedicated involvement of business leaders, to a solid understanding of how advanced technologies such as AI and machine learning can be used.
Here are your 14 need-to-know tips.
-
Fix your digital transformation journey in 4 easy steps
By: ServiceNow and Crossfuze
Type: White Paper
Has your digital transformation (DX) lost its way? Many DX efforts don't achieve their goals. In addition to the sheer dollar amounts tied up in these stalled attempts, there are other, less tangible costs such as sluggish innovation, change fatigue, lack of cross-team productivity, and slower product delivery.
This paper examines the causes of stalled DX and offers four key practices for success.
Discover how to get your DX back on track using these methods and ServiceNow's digital platform that empowers businesses to innovate rapidly and at scale.
Find more content like what you just read:
-
4 methods of effective financial services digital transformation
By: Dell Technologies & Intel
Type: Resource
For companies in banking and financial services, digital transformation (DX) can be a wide-ranging and potentially complex undertaking. Read this custom TechTarget article on Driving Digital Transformation in Financial Services to see how 4 global financial organizations unlocked DX success.
-
Large Enterprises: Consider Your MSSP Options
By: Trustwave
Type: Analyst Report
Take a look through this “ISG Provider Lens Quadrant” report to learn about 27 MSSPs that can support the needs of large enterprises.
-
MSSP landscape: The leaders, their capabilities & more
By: Trustwave
Type: Analyst Report
Review this “ISG Provider Lens Quadrant” report to compare the strengths, challenges and capabilities of 20 top MSSPs for midsize enterprises.
-
The technological evolution of IT industry leaders: Part one
By: TechTarget ComputerWeekly.com
Type: eGuide
This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.
-
4 pillars of digital transformation in the public sector
By: Unit4
Type: Infographic
While 95% of organizations have a DX strategy, only 29% consider theirs to be “complete.” So, what does a successful DX strategy look like and how can you make it reality? Download this infographic to access 4 “ideal conditions” for digital transformation efforts.
-
IT in Europe E-Zine – The Cloud Issue
By: TechTarget Data Center
Type: eBook
There is enormous competitive advantage to be gained by organisations that understand how to take advantage of the opportunities for innovation that the cloud represents. In this month's IT in Europe, we aim to help point you in the right direction.
-
6 cross-organization benefits of observability (O11y)
By: Elastic
Type: White Paper
To unlock the cross-organization benefits of O11y—including high reliability during downtime and migrations—read this paper. It also dispenses recent research explaining how and why O11y is essential for public sector DX.
-
Global Connectivity Index 2016
By: TechTarget ComputerWeekly.com
Type: Research Content
The Global Connectivity Index (GCI) 2016 from Huawei measures the progress of 50 nations in investing in and deploying Information and Communications Technology (ICT) to achieve economic digitisation
-
Developing the Intelligent Core with Windows Server 2019
By: Dell Technologies and Windows
Type: eGuide
65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.
-
Computer Weekly 25 August 2020: When algorithms don't play fair
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
-
Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.
-
CIO Trends #10: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
-
CISO Success Stories
By: TechTarget ComputerWeekly.com
Type: eGuide
The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
-
Meet the GRC challenges of the cloud head-on
By: Dell Software
Type: eGuide
Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
-
The Growing Cost of QuickBooks
By: Citrin
Type: eBook
For businesses that are just getting started, QuickBooks has some obvious benefits— it's inexpensive and it covers the basics. As companies grow, however, they need more than basic accounting software. Making that transition isn't easy.
-
A Computer Weekly buyer's guide to supply chain security
By: TechTarget ComputerWeekly.com
Type: eGuide
Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
-
How to achieve container security best practice
By: TechTarget ComputerWeekly.com
Type: eGuide
In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How to achieve container security best practice
By: TechTarget ComputerWeekly.com
Type: eGuide
In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
The CISO's guide to supply chain security
By: TechTarget ComputerWeekly.com
Type: eGuide
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
A Computer Weekly buyer's guide to cyber insurance
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
-
Computer Weekly – 21 February 2023: Innovation not infestation – digitising pest control
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how Rentokil Initial is using digital innovations to improve the age-old task of pest control. Leading experts offer a 15-point plan to improve diversity and inclusion in IT. And with all the excitement around ChatGPT, we ask whether business is ready to use the AI chatbot. Read the issue now.
-
Information Risk Management – Expectations Versus Reality
By: Tanium
Type: White Paper
Many businesses have identified a gap between their ideas of information risk management strategies and the maturity of their implementations. Through considering the experiences of 12 security professionals, the “Information Risk Management—Expectations Versus Reality” report explores this gap. Continue reading to unlock insights.
-
Ransomware: How it starts via email & how to prevent it
By: Nexum
Type: White Paper
Unless Ransomware is stopped before reaching end users, it will continue to cause severe financial losses and reputational damage—and continue to pad the pockets of cybercriminals. Open this guide to explore the ins and outs of ransomware and how to prevent it.
-
A Computer Weekly buyer's guide to anti-ransomware
By: TechTarget ComputerWeekly.com
Type: eBook
The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
-
A CISO’s guide to attack surface management
By: Palo Alto Networks
Type: White Paper
To protect your attack surface, a modern ASM must work at the speed and scale of the internet to continuously discover, identify, and mitigate all risks. Learn which features to look for in a new ASM, and how to put into place, in this white paper.
-
The Ransomware Solution your CISO will Love
By: Commvault
Type: eBook
If you’re relying on traditional solutions that string together a patchwork of poorly integrated security tools, then your security teams will be at a disadvantage out of the gate as they try to mitigate attacks. Access this e-book to gain actionable insights on how to enhance your organization's overall security posture and ransomware resilience.
-
STATE OF SERVERLESS APPLICATION SECURITY REPORT
By: Contrast Security
Type: Resource
Companies with the agility to evolve with current trends and quickly tap new revenue opportunities are best positioned to survive and thrive in the post-pandemic economy – especially when it comes to protecting critical applications. Read this report for a closer look at application and API security trends and remediation strategies.
-
Alleviating the Stress of CISOs
By: Trustwave
Type: Product Overview
The duties of CISOs are seemingly endless. According to a report by Nominet Cyber Security, 48% of CISOs shared that the stress caused by the job has impacted their mental health. In an effort to alleviate some of that stress, Trustwave developed teams to serve as resources for CISOs. Explore this overview to learn more.
-
CW APAC – July 2021: Trend Watch: Supply Chain Security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain
-
CW APAC buyer's guide to cloud security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
-
8 experts weigh in on better supply chain security
By: Trustwave
Type: White Paper
According to Gartner, 89% of organizations have experienced a supply chain security risk event in the past 5 years. This white paper compiles the opinions of 8 industry-leading experts with the goal of providing insight into the difficulties faced when securing a supply chain, and what can be done to overcome them. Read on to learn more.
-
Computer Weekly - 9 March 2021: Are you ready to return to the office?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, a year after lockdown began, we look at employers' changing attitudes to returning to the workplace. We find out how the software developer community has coped during the Covid-19 pandemic. And we examine the cyber security concerns prompted by latest social media craze, Clubhouse. Read the issue now.
-
Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
-
Connectivity Cloud, Explained - The executive’s guide to regaining IT and security control
By: Cloudflare
Type: eBook
Download this e-book to learn how the connectivity cloud can help deliver to your team unified visibility and control across every domain they are responsible for.
-
Why should you migrate your contact center to the cloud?
By: Cyara
Type: eBook
The recent push for cloud migration has a lot of customer service leaders questioning what it means for their contact centers and other legacy systems. However, if you’re not keeping up with these migration trends, you’re falling behind. Browse this guide to learn more.
-
Computer Weekly - 9 February 2021: Audi fine-tunes its digital performance to boost online car sales
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
-
CW ASEAN: Trend Watch – Security
By: TechTarget ComputerWeekly.com
Type: Ezine
Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
-
Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
-
Computer Weekly – 20 September 2022: A gold medal performance for networking
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
-
The growing need for security consolidation
By: Trend Micro
Type: Product Overview
Integrating individual security solutions and vendors can lead to operational inefficiencies and decreased security effectiveness. With platform consolidation, organizations can attain a stronger security posture, improve performance and efficiency, while reducing complexity. Learn more in this white paper.
-
Enterprise Strategy Group Showcase: Attack surface management
By: Ionix
Type: ESG Showcase
Organizations in the middle of digital transformation initiatives face many security challenges due to their growing attack surfaces. This ESG showcase looks at attack surface management (ASM) solutions, specifically focusing on how IONIX ASM can help organizations monitor, control, and secure their attack surface. Read on to learn more.
-
The Enterprise Buyer’s Guide to Integrated CASB Security
By: Palo Alto Networks
Type: eBook
To address today’s cloud security challenges, enterprises must take an integrated approach to CASBs to keep up with the exponential growth of SaaS. Download this e-book to learn about 5 must-haves of an integrated CASB solution, solution benefits and more.
-
How CM.com improved their application security
By: Contrast Security
Type: Case Study
CM.com has become a global leader in cloud software for conversational commerce that enables businesses to deliver a customized customer experience. By partnering with Contrast Security, CM.com were able to overhaul their application security. Read on to learn more.
-
4 ways to avoid gambling with cyber risk disclosure
By: ServiceNow
Type: eBook
In this e-book, learn the top 4 ways your organization can avoid gambling with cyber risk disclosure, and discover everything you need to know about recent US SEC mandates.
-
How Cloudflare can help protect your data
By: Cloudflare
Type: Product Overview
Data occupies an increasingly important and complex role in the way modern organizations run, but as a result, it has become a primary focus for attackers. Cloudflare One’s data protection suite is built to stay at the forefront of these distinctly modern risks. Download this product overview to learn more.
-
A Computer Weekly buyer's guide to zero-trust security
By: TechTarget ComputerWeekly.com
Type: eGuide
Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.