860 Results for:PDF

  • Sort by: 

Job applications a top HR business cybersecurity risk

By Patrick Thibodeau 03 Mar 2022

Russia's attack on Ukraine has raised the risk of a business cybersecurity attack, and HR may be particularly vulnerable. But there are steps HR can take to protect its company. Read More

Cuba ransomware cartel spoofs Ukraine armed forces

By Alex Scroxton 26 Oct 2022

Ukrainian cyber experts issue a warning over the activities of the Cuba ransomware cartel Read More

Justice transparency: A Computer Weekly Downtime Upload podcast

By Cliff Saran 04 Nov 2022

We speak to The National Archives about how it is using semantic data to make court and tribunal judgments searchable Read More

8 software tools for knowledge sharing and collaboration

By George Lawton 24 May 2023

Knowledge sharing and collaboration are staples of the modern workplace, thanks to remote and hybrid work. These eight tools can improve teams' hybrid collaboration processes. Read More

AI-powered cloud SIEM: Real-time threat intel boosts defences

By Isla Sibanda 08 Sep 2023

Thanks to their advanced data analysis and predictive capabilities, AI and ML will be valuable protective tools going forward. Learn about the potential of AI-backed cloud SIEM technology Read More

The Last Word In Analysing SASE Offerings: Evaluation Advice

By Steve Broadhead 18 Jan 2024

DEFINING A Network Scorecard For Evaluating SASE Cloud Solutions While it could be argued that there are a near-infinite number of variables – and very few constants – that go into defining a SASE ... Read More

Microsoft appears to reverse VBA macro-blocking

By Alex Scroxton 08 Jul 2022

Microsoft quietly reverses VBA macro-blocking across its Office portfolio in a move that has left security experts puzzled Read More

The verdict is Pure as Scottish prosecutor upgrades high-end storage

By Antony Adshead 28 Jul 2022

Scotland’s prosecution service saw disk drives in the dock every week with EMC legacy storage. Now it’s got Pure all-flash and has turned over an (Evergreen) new leaf Read More

The role of Mac file and folder encryption for businesses

By Robert Sheldon 13 Jul 2023

IT administrators can enable the Mac FileVault utility across business files and data to provide an extra layer of security and meet compliance standards. Read More

How to address mobile compliance in a business setting

By Will Kelly, Jack Gold 13 Jun 2023

When organizations plan for compliance and data security, they need to consider mobile devices due to their proliferation in a business setting and how easy it is to lose them. Read More