Environmental Health Reports

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Computer Weekly – 12 September 2023: The dangers of breaking encryption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
Posted: 11 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 08 Feb 2021 | Published: 24 Nov 2020

TechTarget ComputerWeekly.com

Infographic: 5 questions to ask when creating a ransomware recovery plan
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
Posted: 25 Oct 2021 | Published: 25 Oct 2021

TechTarget ComputerWeekly.com

7 top predictive analytics use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
sponsored by AT&T Cybersecurity
WHITE PAPER: Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Risk Management
AT&T Cybersecurity

November ezine: Peer-to-peer lending
sponsored by MicroScope
EZINE: Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for
Posted: 08 Feb 2021 | Published: 26 Oct 2018

MicroScope

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com