Espionage Reports

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

Computer Weekly – 20 June 2023: How to keep network costs affordable
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as demands for networking performance and speed increase, we examine how to keep a handle on costs. Chip makers are investing in PLC flash technology but some think it won't be worth the effort; we investigate. And we listen in as tech industry leaders and politicians discuss the regulation of AI. Read the issue now.
Posted: 19 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com

Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
Posted: 10 Nov 2023 | Published: 14 Nov 2023

TechTarget ComputerWeekly.com

Information Security Asean July 2015
sponsored by TechTarget
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

UKTech50 2021 - The most influential people in UK technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

 The Social Business - Advent of a new age
sponsored by IBM
WHITE PAPER: This white paper discusses the ins and outs of social businesses, uncovering what it means, the value it brings, and what you should expect for the future.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Discover the Unique Benefits of Enterprise Search Technology for Your Organization
sponsored by Google Search Appliance
EGUIDE: Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Google Search Appliance

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by DellEMC and Intel®
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Networking Compliance
sponsored by DellEMC and Intel®
WHITE PAPER: This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

DellEMC and Intel®