In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
To help address rising incidents of chronic illness, an ageing population, more expensive drugs and a shortage of clinical staff, Hull University Teaching Hospitals NHS Trust, looks to new technology and is seen as a pioneering and innovative healthcare provider. In this case study, discover why they turned to Zebra for a new technology need.
In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.
In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
In this issue, we ask experts how they're approaching digital transformation to meet customers demand, and we look at whether the actions of the user should reflect on the accountability of the cloud provider
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.