How can your organization’s software development practices be agile yet secure? Exploring how to approach that balancing act, this white paper highlights the importance of a proactive stance for software supply chain security. To discover how to adopt that stance, dig into the 10-page paper.
In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Findings show that 91% of all cyber-attacks begin with a phishing email. Cloudflare’s Area 1 cloud-native email security solution was designed to leverage preemptive campaign intelligence, ML-based content analysis, and a unified Zero Trust platform to stop phishing threats before they reach your workforce. Read on to learn more.
In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.
In this product overview, discover how Digibee's extensive list of features can help you eliminate development barriers and support seamless integrations.
In the face of tight budgets, many public service agencies are striving to reduce their cloud costs. To unlock guidance for accomplishing that mission, explore this 59-page leader’s guide.
In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
ZeOmega and the Center for Open Data Enterprise (CODE) have collaborated to create a powerful white paper addressing challenges related to Health-Related Social Needs (HRSN) interventions. Download it now to learn about opportunities to apply funding to address social needs.
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.