Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE:
In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012
|
|
|
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD:
The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011
|
|
|
The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012
|
|
|
Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT:
This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
Rise in Ransomware Attacks Prompts New Prevention Priorities
sponsored by Cisco Umbrella
EGUIDE:
Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
Posted: 11 Feb 2020 | Published: 11 Feb 2020
|
|
|
The Transformational CISO’s Guide to Security Orchestration, Automation and Response
sponsored by Splunk
EBOOK:
The role of the CISO is changing and the most successful organizations are recognizing that genuine digital and business transformation depends on security modernization. Tap into this e-book to learn how SOAR can help many of the biggest challenges facing CISOs.
Posted: 19 Aug 2022 | Published: 19 Aug 2022
|
|
|
How To Achieve Risk-Based Vulnerability Management
sponsored by AT&T Cybersecurity
WHITE PAPER:
Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
Posted: 09 Apr 2021 | Published: 09 Apr 2021
|
|
|
How to Choose a Managed Extended Detection and Response Solution
sponsored by BlackBerry
ESSENTIAL GUIDE:
Tap into this white paper to understand four benefits and eight factors to consider when comparing and choosing a managed XDR solution and the advantages of a managed XDR service for your various stakeholders.
Posted: 27 Jun 2022 | Published: 27 Jun 2022
|
|
|
Building Successful Blockchain Infrastructure
sponsored by OVHCloud
WHITE PAPER:
If you want to build a successful blockchain offering, then it is critical that you invest energy into crafting your infrastructure strategy. Doing so will help you to sidestep issues like regulatory oversight and high management overheads. Check out this white paper to access tips for developing and optimizing your infrastructure strategy.
Posted: 15 Mar 2023 | Published: 15 Mar 2023
|
|
|
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE:
This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by TechTarget Security
EZINE:
Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016
|
|
|
How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE:
Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013
|
|
|
Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now.
Posted: 28 Nov 2011 | Published: 28 Nov 2011
|
|
|
Tips on Managing the Deluge of Information Security Threat Reports
sponsored by TechTarget Security
EGUIDE:
Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013
|
|
|
Modernize Your Threat Intelligence Platform
sponsored by ThreatConnect
EBOOK:
To combat the inherent asymmetric informational disadvantage, security teams can use cyber threat intelligence (CTI) to assess whether alerts or events are meaningful within the context of broader situational awareness. Learn how to build an effective CTI operations function by downloading this e-book.
Posted: 11 Jan 2023 | Published: 11 Jan 2023
|
|
|
Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by TechTarget Security
EBOOK:
In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015
|
|
|
Cyber Recovery as a Service from Elastio
sponsored by Elastio
ESG:
According to ESG research, 83% of organizations now report an increased focus on vendor risk assessment as supply chain attacks have become more prevalent. Access this ESG report to learn how you can create more resilient data protection infrastructure that can enhance existing cybersecurity mechanisms to further prevent ransomware.
Posted: 06 Jan 2023 | Published: 07 Jan 2023
|
|
|
FROM ZERO TO SOC Attain a Security Operations Center through SOC-as-a-Service
sponsored by Netsurion
WHITE PAPER:
This white paper lays out the real requirements for a SOC, and proposes a practical, affordable way to get the targeted, tailored protection your specific business needs without breaking the bank.
Posted: 02 Sep 2021 | Published: 02 Sep 2021
|
|
|
Transform to Better Perform: Evolve Your Data Center
sponsored by Dimension Data
WHITE PAPER:
Modern business changes fast. Learn how aging infrastructure stifles innovation and growth to hold your company back.
Posted: 22 Feb 2016 | Published: 22 Feb 2016
|
|
|
4 Ways XDR Levels Up Security Programs
sponsored by Rapid7
WHITE PAPER:
With complex cyberattacks on the rise, how can your business boost its security program’s defenses? Step in XDR (Extended Detection and Response). This white paper presents 4 ways that XDR can enhance security programs. #1: Simplifies SecOps by providing precise, speedy insights. Keep reading to unlock the rest.
Posted: 05 Jan 2023 | Published: 05 Jan 2023
|
|
|
The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE:
Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 08 Feb 2021 | Published: 25 Oct 2019
|
|
|
CIO Decisions E-zine: May 2014
sponsored by TechTarget CIO
EZINE:
Innovations of the new mobility age, including the connected car, mean that CIOs need to reframe their mobile strategy with a customer-focused slant.
Posted: 05 May 2014 | Published: 07 May 2014
|
|
|
The Path To Security Effectiveness
sponsored by Arctic Wolf
WHITE PAPER:
Despite the prevalence of cyberattacks only 1 in 1000 companies have a security operations center (SOC) according to SANS. With the average cost of a breach sitting $3.9 million, organizations need a solution. Access this white paper to learn how to solve the effectiveness problem in cybersecurity what the 5 pillars are for a successful SOC.
Posted: 21 Mar 2022 | Published: 21 Mar 2022
|
|
|
Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER:
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010
|
|
|
Data Center Evolution in the Era of the Cloud
sponsored by Dimension Data
WHITE PAPER:
Data centers are crucial to the changing business world. Learn to handle growing data, add new applications and more.
Posted: 22 Feb 2016 | Published: 22 Feb 2016
|
|
|
New Mobile Risks Call for a Layered Security Approach
sponsored by TechTarget CIO
EBOOK:
As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016
|
|
|
September Information Security Magazine
sponsored by TechTarget Security
EZINE:
Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
Posted: 30 Aug 2013 | Published: 30 Aug 2013
|
|
|
CIO Decisions: Master Multichannel Customer Engagement
sponsored by TechTarget CIO
EZINE:
Unscrambling the multiple channels by which customers engage calls for close collaboration between CIOs and their business peers. Learn more about multichannel customer engagement strategy in CIO Decisions ezine.
Posted: 03 Dec 2014 | Published: 03 Dec 2014
|
|
|
Information Security – May 2014
sponsored by TechTarget Security
EZINE:
The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014
|
|