All Research Sponsored By:TechTarget ComputerWeekly.com

Top 11 cloud security challenges and how to combat them
EGUIDE: Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023


7 top predictive analytics use cases
EGUIDE: Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
Posted: 15 Feb 2023 | Published: 16 Feb 2023


Beginner's guide to Internet of Things
EGUIDE: The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
Posted: 15 Feb 2023 | Published: 16 Feb 2023


CW APAC: Expert advice on data analytics
EZINE: In this handbook, focused on data analytics in the Asia-Pacific region, Computer Weekly looks at how to marry the art and science of analytics, environmental considerations, the risks of sovereign data strategies and what one telco has done to address scalability challenges.
Posted: 15 Feb 2023 | Published: 15 Feb 2023


12 API security best practices
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023


Computer Weekly – 14 February 2023: Where next for NHS IT?
EZINE: In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.
Posted: 10 Feb 2023 | Published: 14 Feb 2023


5 types of data security
INFOGRAPHIC: Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
Posted: 09 Feb 2023 | Published: 09 Feb 2023


8 big data use cases for businesses and industry examples
EGUIDE: For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.
Posted: 09 Feb 2023 | Published: 09 Feb 2023


10 common uses for machine learning applications in business
EGUIDE: Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:
Posted: 09 Feb 2023 | Published: 09 Feb 2023


Multifactor authentication: What are the pros and cons?
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023


Computer Weekly - 31 January 2023: How the cost-of-living crisis is affecting IT
EZINE: In this week's Computer Weekly, we examine what the cost-of-living crisis means for IT leaders and tech professionals. We analyse what you need to consider when reversing systems out of the cloud and back on-premise. And Very Group's CIO talks about the post-pandemic challenges facing online retailers. Read the issue now.
Posted: 31 Jan 2023 | Published: 31 Jan 2023


Computer Weekly - 24 January 2023: BBC under scrutiny over its digital strategy
EZINE: In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.
Posted: 23 Jan 2023 | Published: 24 Jan 2023


The ultimate guide to identity & access management
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023


19 machine learning interview questions and answers
EGUIDE: Aspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.
Posted: 22 Jan 2023 | Published: 23 Jan 2023


Trend Watch: CIO trends
EZINE: In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at predictions for 2023, how the Australian Red Cross managed a donation surge, Mondelez's digital transformation and Singapore's public sector IT strategy.
Posted: 19 Jan 2023 | Published: 19 Jan 2023


How do cybercriminals steal credit card information?
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023


Infographic: 5 cybersecurity trends for 2023
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023


Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth
EZINE: In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.
Posted: 16 Jan 2023 | Published: 17 Jan 2023


Top 10 ANZ IT stories of 2022
EGUIDE: In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 15 Jan 2023 | Published: 16 Jan 2023


Top 10 ASEAN IT stories of 2022
EGUIDE: Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
Posted: 15 Jan 2023 | Published: 16 Jan 2023


Top 10 India IT stories of 2022
EGUIDE: In this roundup, we recap the top 10 stories in India, including the digitisation work undertaken by global firms in the country, progress made by local enterprises in harnessing technology and how a female coder rose through the ranks in her software development career.
Posted: 15 Jan 2023 | Published: 16 Jan 2023


Fail to prepare quality data, prepare to fail
EGUIDE: Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".
Posted: 29 Dec 2022 | Published: 29 Dec 2022


Computer Weekly – 7 February 2023: Making IT security training stick
EZINE: In this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.
Posted: 03 Feb 2023 | Published: 07 Feb 2023


CW EMEA – February 2023: Kyiv is ready for anything
EZINE: In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.
Posted: 02 Feb 2023 | Published: 09 Feb 2023


CW EMEA - January 2023: Protecting the privacy of schoolchildren
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023