860 Results for:PDF
- Sort by:
Job applications a top HR business cybersecurity risk
03 Mar 2022Russia's attack on Ukraine has raised the risk of a business cybersecurity attack, and HR may be particularly vulnerable. But there are steps HR can take to protect its company. Read More
Cuba ransomware cartel spoofs Ukraine armed forces
26 Oct 2022Ukrainian cyber experts issue a warning over the activities of the Cuba ransomware cartel Read More
Justice transparency: A Computer Weekly Downtime Upload podcast
04 Nov 2022We speak to The National Archives about how it is using semantic data to make court and tribunal judgments searchable Read More
8 software tools for knowledge sharing and collaboration
24 May 2023Knowledge sharing and collaboration are staples of the modern workplace, thanks to remote and hybrid work. These eight tools can improve teams' hybrid collaboration processes. Read More
AI-powered cloud SIEM: Real-time threat intel boosts defences
08 Sep 2023Thanks to their advanced data analysis and predictive capabilities, AI and ML will be valuable protective tools going forward. Learn about the potential of AI-backed cloud SIEM technology Read More
The Last Word In Analysing SASE Offerings: Evaluation Advice
18 Jan 2024DEFINING A Network Scorecard For Evaluating SASE Cloud Solutions While it could be argued that there are a near-infinite number of variables – and very few constants – that go into defining a SASE ... Read More
Microsoft appears to reverse VBA macro-blocking
08 Jul 2022Microsoft quietly reverses VBA macro-blocking across its Office portfolio in a move that has left security experts puzzled Read More
The verdict is Pure as Scottish prosecutor upgrades high-end storage
28 Jul 2022Scotland’s prosecution service saw disk drives in the dock every week with EMC legacy storage. Now it’s got Pure all-flash and has turned over an (Evergreen) new leaf Read More
The role of Mac file and folder encryption for businesses
13 Jul 2023IT administrators can enable the Mac FileVault utility across business files and data to provide an extra layer of security and meet compliance standards. Read More
How to address mobile compliance in a business setting
13 Jun 2023When organizations plan for compliance and data security, they need to consider mobile devices due to their proliferation in a business setting and how easy it is to lose them. Read More