In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
Cyber resilience is essential for business continuity and rapid recovery. The Redjack platform offers visibility into assets, identifies critical functions and dependencies, and assigns resilience and criticality scores to prioritize security efforts. Read the full white paper to learn how Redjack can help build effective cyber resilience.
From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
Organizations face the challenge of securing complex multi-cloud environments. Chef Compliance automates system hardening and compliance with CIS Benchmarks and DISA STIGs. This guide illustrates how you can use Chef Compliance to achieve system hardening by mapping CIS and DISA benchmark standards to automated controls. Dive into the guide here.
This Red Hat e-book explains transforming applications for agility and efficiency, covering trends like cloud-native development, AI/ML integration, and legacy app replatforming. The e-book dives into how OpenShift provides a platform to build, deploy, and manage apps with consistency and security. Read the e-book here.
The key to smooth, successful and meaningful data center upgrades is preparation. Know the goals and the path to each goal, and meet the roadblocks along the way to bring huge benefits to the upgrade process. In this e-guide, learn the 11 key steps you must take to ensure neat migrations, good availability, continued security and limited downtime.
In this analyst report, IDC analyzes the global managed SD-WAN/SASE services market, highlighting Verizon's leadership position. Key takeaways include the evolution toward integrated networking and security, challenges with enterprise adoption, and Verizon's strengths in multivendor offerings and visibility. Read the full report to learn more.
Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.
When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.
In this issue, we explore how the growing hype of generative artificial intelligence is set to make change in the storage and backup management world, as well as the concerns and limits of the technology. Also, read about the importance of getting MSSPs and suppliers on the same page, and how SSC is moving to meet customer needs.