In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.
As we celebrate MicroScope's 40 anniversary, we look back (and forward) to assess how the channel keeps changing, with experts weighing in with their opinions
As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.
In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Every year, Computer Weekly conducts a large-scale survey of our readers to find out their IT spending priorities for the year ahead – it's always an interesting take on what's happening in IT departments around the country because it's coming from the leaders making those technology purchasing decisions.
Enterprise browsers are the key to securing organizations in a threat landscape where identities and attacker innovations are on the rise. This whitepaper presents the top 14 use cases security leaders can tap into to bolster their security posture.
In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.
In this white paper, take a big-picture look at privileged access management (PAM) and how it compares with other access management concepts. Read to learn about the different types of privileged accounts, the risks associated with those accounts when they go unmanaged and how you can use PAM to mitigate these risks.