CSA White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

A Computer Weekly buyer's guide to asset management for hybrid IT
sponsored by Livingstone Group
EGUIDE: Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.
Posted: 08 Feb 2021 | Published: 25 Mar 2019

Livingstone Group

Focus: Health IT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: At a time when the NHS is faced with unprecedented pressure, new technological solutions can help ease some of the strain. From apps to electronic records and artificial intelligence, technology is playing an increasingly important part in transforming the health service.
Posted: 08 Feb 2021 | Published: 01 Sep 2017

TechTarget ComputerWeekly.com

Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 04 Jan 2021

TechTarget ComputerWeekly.com

Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 07 Jul 2020

TechTarget ComputerWeekly.com

Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

Essential Guide: APAC women in cyber security
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
Posted: 04 Oct 2021 | Published: 04 Oct 2021

TechTarget ComputerWeekly.com

UCaaS Buyers’ Checklist
sponsored by 8x8
PRODUCT OVERVIEW: The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
Posted: 31 May 2024 | Published: 31 May 2024

TOPICS:  .NET
8x8

Secure Connectivity for Devices and Users at the Network Edge
sponsored by Cradlepoint
EBOOK: Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
Cradlepoint

Top Healthcare Cybersecurity Predictions For 2024
sponsored by XtelligentMedia Healthcare
EGUIDE: Industry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024. Read more about it in this eGuide.
Posted: 12 Feb 2024 | Published: 12 Feb 2024

XtelligentMedia Healthcare

Top Healthcare Cybersecurity Predictions For 2024
sponsored by XtelligentMedia Healthcare
EGUIDE: Industry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024.
Posted: 14 Feb 2024 | Published: 15 Feb 2024

XtelligentMedia Healthcare

Cloud: A security risk and opportunity
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.
Posted: 08 Feb 2021 | Published: 15 Jan 2018

TechTarget ComputerWeekly.com

The Cloud Influence on GRC
sponsored by TechTarget Security
EBOOK: Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
Posted: 19 Sep 2024 | Published: 23 Apr 2014

TechTarget Security

Computer Weekly – 25 June 2024: A revolution in space
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to astronaut Tim Peake about the imminent revolution in space tech and what it means for IT leaders. AI is set to transform the movie industry – we hear what it means for the producers of the latest Mad Max film. And we find out about plans for Saudi Arabian smart city Neom. Read the issue now.
Posted: 24 Jun 2024 | Published: 25 Jun 2024

TechTarget ComputerWeekly.com

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 08 Feb 2021 | Published: 06 Oct 2016

Dell Software

Kaspersky Managed Detection and Response features
sponsored by Kaspersky
PRODUCT OVERVIEW: Kaspersky's Managed Detection and Response (MDR) service provides around-the-clock monitoring and expert-led threat hunting to detect and respond to security incidents. Learn how Kaspersky MDR's advanced analytics, global threat intelligence, and guided response can protect your organization. Read the full product overview.
Posted: 04 Oct 2024 | Published: 05 Oct 2024

Kaspersky

A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

CW APAC buyer's guide to cloud security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
Posted: 08 Feb 2021 | Published: 07 Mar 2019

TechTarget ComputerWeekly.com

Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016

TechTarget ComputerWeekly.com

Cisco UCS X9508 Chassis
sponsored by Cisco
PRODUCT OVERVIEW: The Cisco UCS X9508 Chassis simplifies the data center with cloud-operated infrastructure, adaptability for modern apps, and engineering for the future. Access this white paper to discover how this modular system can support your evolving workloads.
Posted: 01 Oct 2024 | Published: 04 Oct 2024

Cisco

Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024

TechTarget ComputerWeekly.com

How To Choose The Right CX Delivery Partner In An Age Of Rising Cyber Threats
sponsored by Foundever
EBOOK: Secure your customer experience with the right BPO partner. This guide explores how to identify genuine security best practices, mitigate risks, and maximize rewards. Read the full white paper to learn how to choose the right CX delivery partner in an age of rising cyber threats.
Posted: 13 Sep 2024 | Published: 18 Sep 2024

Foundever

CW Middle East: UAE faces IT recruitment challenge
sponsored by TechTarget ComputerWeekly.com
EZINE: With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.
Posted: 08 Feb 2021 | Published: 13 Apr 2017

TechTarget ComputerWeekly.com

Modernize Edge Computing In Oil And Gas With Red Hat And Intel
sponsored by Red Hat and Intel
WHITE PAPER: This paper describes how Red Hat and Intel combine leading microprocessor hardware and open source software to address edge computing challenges. Read the paper here.
Posted: 26 Mar 2024 | Published: 26 Mar 2024

TOPICS:  .NET
Red Hat and Intel

CoIP® Platform Zero Trust Architecture
sponsored by Zentera Systems Inc.
WHITE PAPER: Zentera's CoIP Platform provides a comprehensive Zero Trust security overlay that can be rapidly deployed without modifying existing network infrastructure. Learn how CoIP Platform maps to the NIST SP 800-207 Zero Trust Architecture guidelines in this white paper.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Unified Communications Buyers’ Guide
sponsored by 8x8
EBOOK: In this e-book, explore the key themes and concepts organizations should consider when selecting Unified Communications as a Service (UCaaS) technology.
Posted: 30 May 2024 | Published: 30 May 2024

TOPICS:  .NET
8x8