Internet Blocking Software Reports

CW APAC: Trend watch: Enterprise resource planning
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.
Posted: 18 Aug 2022 | Published: 18 Aug 2022

TechTarget ComputerWeekly.com

CW Benelux February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 08 Feb 2021 | Published: 01 Feb 2018

TechTarget ComputerWeekly.com

Computer Weekly – 7 November 2017: The ethics of software development
sponsored by TechTarget ComputerWeekly.com
EZINE: Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
Posted: 08 Feb 2021 | Published: 03 Nov 2017

TechTarget ComputerWeekly.com

CW Middle East ezine April 11 2019
sponsored by TechTarget ComputerWeekly.com
EZINE: It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
Posted: 08 Feb 2021 | Published: 11 Apr 2019

TechTarget ComputerWeekly.com

Getting the best out of robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

CW Nordics November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 19 September 2017: Can DevOps deliver on its productivity promises?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Sep 2017

TechTarget ComputerWeekly.com

Infographic: 2019 Europe IT Priorities - Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

MITRE ATT&CK: Climb to the top
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com