• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Desktop/Laptop OS
flow-image
ServiceNow

Creating the ultimate spend-smart IT asset management system

More than US $3 trillion has been invested in digital transformation over the last three years, but too much of that has been funneled into point solutions that have failed to solve for the needs of the modern enterprise—like reducing IT spend. In fact, much of that capital and operating expense is not well tracked...

Published: Apr 13, 2022
View More
flow-image
Workday USA

Workday for the Federal Government

Watch this demo to learn how Workday Government Cloud can help organizations like yours bring together human resources, talent management, payroll, reporting, analytics, and more—all in a unified, cloud-based system.

Published: May 17, 2022
View More
flow-image
Box

Hope is NOT a strategy: Secure your business with the Content Cloud

Seems like every week there's news of another cybersecurity breach. Ponemon Institute has found that the typical data breach costs an average of $3.9 million, and that just one breach can decrease your company's stock price by 5%. No one wants to be that kind of typical — no what can you do about it? ...

Published: May 13, 2022
View More
flow-image
Amazon Web Services: AWS

Accelerate Machine Learning Development to Build Intelligent Applications Faster

Predict business outcomes, drive value, increase developer productivity, and accelerate innovation in your organization by reconsidering how your business builds intelligent applications. Read the IDC whitepaper from AWS and Nvidia to learn how Amazon SageMaker and deep learning on AWS help solve typical development challenges...

Published: Apr 25, 2022
View More
flow-image
Tessian

You Got Phished, Now What?

Security leaders work hard to prevent successful phishing attacks. But, despite email security solutions and training, there’s still a high probability that an employee will click on a malicious link or open a malicious attachment. What then? We explore today’s threat landscape and share real...

Published: May 27, 2022
View More
flow-image
ServiceNow

Activate ESG Use Case Guide Discover more ways ServiceNow can help you drive ESG impact and value

Environmental, Social, and Governance (ESG) is about driving business growth while building a more sustainable, equitable, and ethical future. In simple terms, ESG is about doing well BY doing good. ESG topics include climate, waste, human rights, diversity, and philanthropy, as well as topics that are considered traditional...

Published: Apr 13, 2022
View More
flow-image
Vipre

10 Security Tips for Businesses

SECURITY THAT PROTECTS YOUR BUDGET Vanishing budgets, reckless users, infected machines, unpatched software - this is what IT admins are up against every day.  How do you keep up?  How do you ensure you’re meeting demands for the...

Published: May 25, 2022
View More
flow-image
Dragos

Whitepaper: PIPEDREAM: Chernovite’s Emerging Malware Targeting Industrial Control Systems

Threats to industrial infrastructure security are an extremely sensitive matter. Given the unique realities of industrial operations it is often harder for defenders to react than for adversaries to leverage public information. The more time the community has to implement mitigations before new malicious capabilities become...

Published: May 05, 2022
View More
flow-image
Zimperium

Operationalizing CDM and Securing Mobile Assets across the Federal Enterprise

The Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) program includes updated and modern cybersecurity guidelines for the fortifying of government networks and systems. Here, Zimperium consider the most advanced mobile threat defense solutions to align with CDM goals.

Published: May 24, 2022
View More
flow-image
Lacework

2022 Cloud Threat Report, Volume 3

Cybercriminals are racing to exploit vulnerabilities, and the scope and damage potential of their cyber attacks continues to escalate. Exposing attacker trends and techniques is vital to providing actionable information to security leaders and practitioners. The 2022 Cloud Threat Report, Volume 3, delivers detailed,...

Published: May 16, 2022
View More
flow-image
Dell Technologies & Intel

MIT eBrief: Shaping the Future of Hybrid Work

The 2020 coronavirus pandemic had a transformative effect on where—and how—we worked. Nearly two years in, technological and cultural changes are cultivating a fairer, kinder normal. What have we learned? What are some of the great things we want to carry forward? What were some of those challenges or...

Published: May 11, 2022
View More
flow-image
Fortinet

Don’t Diverge—Converge

Digital acceleration is driving the adoption of hybrid IT architectures. These new hybrid environments blend data centers, campuses, branches, home offices, and multi-cloud environments into a dynamic, interconnected networking environment. When implemented correctly, a hybrid network provides critical services that traditional...

Published: May 04, 2022
View More
flow-image
Workday USA

HR Modernization Strategies in Government

Federal employees want quick, easy solutions to their HR questions—and HR departments want to spend more time on recruitment, retention, and human capital management challenges. In our “HR Modernization Strategies in Government” webinar, learn how your organization can: Understand how digital...

Published: May 17, 2022
View More
flow-image
Lacework

Nylas quickly protects against the Log4j vulnerability using Lacework

Nylas is a communications API platform that helps developers quickly and securely build email, scheduling, and work automation features directly into their applications. They have a multicloud environment, operating on both Amazon Web Services (AWS) and Google Cloud, and use a mix of containerized and non-containerized...

Published: May 16, 2022
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon