• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Latest Whitepapers
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  •  
  •  
flow-image
AWS Training and Certification

The AI & Machine Learning Imperative

Companies across various industries are seeking to integrate AI & machine learning (ML) into workflows for a wide range of essential processes, including customer service, supply chain, operations, and strategic decision-making. However, it can be difficult for today’s leaders and their teams to separate the...

Published: Jan 06, 2022
View More
flow-image
Proofpoint

The Human Factor Report 2021 Findings

Every day, we analyse more than 2.2 billion email messages, 35 billion URLs, 200 million attachments, 35 million cloud accounts and trillions of data points in all across all the digital channels. The findings of a year’s worth of valuable threat research culminates in one of the largest and most diverse datasets...

Published: Dec 21, 2021
View More
flow-image
AWS Training and Certification

Achieving Transformative Business Results with Machine Learning

Transform with AWS ML Thanks to the rapid adoption of cloud computing, the rise of compute power and data volumes, and the emergence of easy-to-use solutions that require little or no experience, machine learning (ML) is now more accessible than ever. Leading organizations of every shape and size and across nearly...

Published: Jan 06, 2022
View More
flow-image
Oracle

Oracle’s Next-Gen Exadata X9M Crushes the Competition – in the Cloud and On-Premises

Giving customers choice, and simplifying the process Enterprises require scalable, high-performance cloud database services to improve resiliency, simplify operations, and reduce costs. But not all workloads can easily move to public cloud regions due to data sovereignty, security, and low-latency requirements....

Published: Dec 22, 2021
View More
flow-image
Proofpoint

10 Biggest and Boldest Insider Threats of 2021

Over the last two years alone, insider security incidents have jumped 47%, with the average cost per incident up 31%. That risk is only increasing in an era of remote working and distributed teams. Today, anyone with insider access—outside contractors, consultants and vendors—can pose an insider threat....

Published: Dec 21, 2021
View More
flow-image
ServiceNow

Create continuity plans that minimize disruptions and protect critical assets​

Discover how to make creating an effective BCM plan simple, by moving business continuity and disaster recovery onto a single platform.​​

Published: Apr 04, 2022
View More
flow-image
Proofpoint

Ponemon Cost of Insider Threats Global Report

Independently conducted by Ponemon Institute External attackers aren’t the only threats modern organisations need to consider in their cybersecurity planning. Malicious, negligent, and compromised users are a serious and growing risk. As the 2022 Cost of Insider Threats: Global Report reveals, insider threat...

Published: Apr 06, 2022
View More
flow-image
VMware

MIT Executive Study Uncovers Top Healthcare Trends Shaping IT Resilience

Takeaway: Healthcare IT organizations are pivoting quickly as digital technologies become a necessity to serving sick patients in pop-up and overflowing hospitals while keeping healthy patients safe. 

Published: Apr 06, 2022
View More
flow-image
Proofpoint

2021 Voice Of The CISO Report

There's no question that 2020 was a challenging year. The pandemic placed an enormous strain on the global economy, and cyber criminals took advantage of that and accelerated their nefarious activities. Cybersecurity teams around the world were challenged to shore up their security posture in this new and changing...

Published: Dec 21, 2021
View More
flow-image
Fujitsu

Unlocking the Secrets of the Hybrid Cloud Leaders

For years, companies have been investing in new technologies, cultivating their culture, and transforming their processes in the race to get ahead of the competition. The pandemic was a hurdle nobody saw coming. For many businesses it was a disruption too far. Others just about managed to keep going. But some powered...

Published: Mar 03, 2022
View More
flow-image
AWS Training and Certification

7 Leading Machine Learning Use Cases

Machine learning drives results While machine learning has moved beyond the hype to become a meaningful driver of value, many organizations struggle to understand where it should be applied to make the most impact. In this eBook, we have outlined seven leading use cases where organizations have successfully applied...

Published: Jan 06, 2022
View More
flow-image
Proofpoint

Gartner How to Prepare for Ransomware Attacks

Ransomware attacks continue to increase, using techniques that are growing more and more sophisticated and targeted. Security and risk management leaders need to look beyond just the endpoints to help protect the organization from ransomware. Read now to find out how to prepare for Ransomware Attacks. 

Published: Dec 21, 2021
View More
flow-image
Proofpoint

Ponemon Cost of Insider Threats Global Report

Independently conducted by Ponemon Institute External attackers aren’t the only threats modern organisations need to consider in their cybersecurity planning. Malicious, negligent, and compromised users are a serious and growing risk. As the 2022 Cost of Insider Threats: Global Report reveals, insider threat...

Published: Apr 06, 2022
View More
flow-image
Proofpoint

User Risk Report

Behind almost every cyber attack is someone who fell victim to it. In each case, someone has clicked the wrong link, opened the wrong file or trusted the wrong email. In the 2021 Verizon Data Breach Investigations Report1, 85% of breaches involved human error. Despite constantly changing tactics, evolving malware...

Published: Dec 21, 2021
View More
flow-image
Proofpoint

Is Microsoft 365 the Attackers' New Playground?

Driven by Microsoft 365, digital transformation is remaking every aspect of modern business. Many organisations are moving to a 'cloud first' model, but security is often not invited to the table early enough. As businesses move to the cloud, particularly SaaS applications like Microsoft 365, there is a sense...

Published: Dec 21, 2021
View More
flow-image
Oracle and Intel®

Oracle X9M turbocharges analytics and OLTP performance: Doubling down on RoCE and PMEM

Read how Oracle’s new Exadata X9M expands capacity, raises performance, and lowers processing costs. With microsecond-level latency and increased backup capacity, Oracle addresses the need for enterprise database consolidation Powered by Intel®

Published: Mar 24, 2022
View More
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon