EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
DATA SHEET:
The Computer Weekly Innovation Awards APAC 2024 will once again shine the spotlight on digital transformation projects that have delivered business impact and/or solved problems using innovative approaches. All entries will be assessed by an independent panel of judges. Download your nomination form here.
EZINE:
In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.
EZINE:
In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.
LANDING PAGE:
Business stakeholders, IT professionals, data scientists, and end users continue to weigh the benefits, use cases, and best practices of generative AI (GenAI) against concerns with AI ethics and hallucinations. TechTarget's Enterprise Strategy Group aims to cut through this distracting noise, in our just-launched 2024 Generative AI Pulse Study.
EZINE:
In this week's Computer Weekly, we reveal the 50 most influential people in UK IT for 2022, and talk to the winner of the 12th annual UKtech50, National Cyber Security Centre CEO Lindy Cameron. Also, we take an in-depth look at the crisis in chip supply and what's needed to solve it. Read the issue now.
EGUIDE:
Read this e-book to gain guidance on how to establish an employee-centric digital workplace, including must-see security considerations for which everyone is responsible.