Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.
In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Most passwords are insecure, either being too easy to guess, or too readily shared.But what if your organization didn’t need passwords? Download this e-book to learn how a passwordless authentication platform works and see how it could reduce cyber risk in your organization.
Despite the vast expanse of applications that could benefit from AI integration, the shortage of dedicated AI specialists often poses a bottleneck. This white paper aims to close the gap by enabling software development and operations professionals to effectively recognize AI use cases and perform initial assessments. Read on to learn more.
Identities and access need to be managed in order to meet compliance standards and endure the long-term security of your organization. This e-book describes how your organization can achieve secure, continuous compliance through an identity governance framework. Read on to learn more.
Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
With opportunities around edge computing on the up, we ask experts to weigh in on how the channel can approach using the tech to its advantage. Also discover how to encourage employees to take cyber security lessons seriously, and how collaboration is key to growth this year