In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.
In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
This report examines the disconnect between password security best practices and actual user behavior. Despite industry recommendations, many still use weak or repeated passwords. Learn how to bridge this gap and improve your password hygiene by reading the full White Paper.
The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.
Asset inventories may seem deceptively simple, but they can make a serious difference when it comes to cybersecurity. The Redjack platform uses non-intrusive software-based network sensors to give you a comprehensive view of your connected infrastructure. Download the full product overview to learn more.
Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.
Legacy security can be inadequate for cloud workloads. To find out how to deliver zero trust security and simple, secure access for your cloud workloads on AWS, check out this product overview.