WEBCAST:
Join Elizabeth Woodward, IBM Agile Practice Expert, as she discusses how software development leaders and agile teams can identify the impact of choices in organizing their team structure to optimize a distributed Agile methodology.
EZINE:
In this week's Computer Weekly, we reveal our annual salary survey, comparing IT professionals' pay and attitudes to their job – how does yours stack up? The new digital chief at DWP discusses AI, data modernisation and shaking up the tech behind the benefits system. Read the issue now.
INFOGRAPHIC:
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
INFOGRAPHIC:
The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
EZINE:
In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at predictions for 2023, how the Australian Red Cross managed a donation surge, Mondelez's digital transformation and Singapore's public sector IT strategy.
EZINE:
In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.
EZINE:
In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
GARTNER RESEARCH REPORT:
This Gartner report defines the concrete security needs across the software development lifecycle and explains how to select the most suitable DevSecOps tools. Read the report to review the tooling options at your disposal.
WHITE PAPER:
Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.