WHITE PAPER:
Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
EGUIDE:
In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
EBOOK:
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
WHITE PAPER:
Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
EGUIDE:
In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
WHITE PAPER:
This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
EGUIDE:
There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
EGUIDE:
In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
EGUIDE:
Auto Trader is the UK's biggest online marketplace for new and used car sales. Its head of infrastructure sets out how cloud, containers and microservices will help reinforce its market-leading position in the years to come
EGUIDE:
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.