Severe Acute Respiratory Syndrome Reports

Preparing the Enterprise for a Pandemic
sponsored by Avaya Inc.
WHITE PAPER: This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response.
Posted: 09 Jun 2008 | Published: 01 Sep 2006

Avaya Inc.

A Computer Weekly buyer's guide to managing paper processes
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TechTarget ComputerWeekly.com

CW ANZ, July 2020: Expert Advice on Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
Posted: 22 Jan 2024 | Published: 23 Jan 2024

TechTarget ComputerWeekly.com

Traditional vs. enterprise risk management: How do they differ?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
Posted: 29 Jun 2023 | Published: 29 Jun 2023

TechTarget ComputerWeekly.com

The gender pay gap
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.
Posted: 08 Feb 2021 | Published: 26 Apr 2017

TechTarget ComputerWeekly.com

Threat management: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 08 Feb 2021 | Published: 25 Nov 2016

TechTarget ComputerWeekly.com

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

MITRE ATT&CK, a guide for businesses in 2022
sponsored by TechTarget ComputerWeekly.com
EBOOK: Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
Posted: 11 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com