Computer Weekly – 2 May 2023: The ethics of military AI
EZINE:
In this week's Computer Weekly, as the defence sector looks into using AI to create autonomous weapons, we examine the risks and ethics of military AI. AWS is under fire for not providing vital emissions data to customers – we investigate. And we find out what IT security teams can learn from cyber warfare in Ukraine. Read the issue now.
Posted: 02 May 2023 | Published: 02 May 2023
|
|
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
EZINE:
In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
Posted: 21 Apr 2023 | Published: 25 Apr 2023
|
|
Top 14 ransomware targets in 2023 and beyond
EGUIDE:
According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.
Posted: 21 Apr 2023 | Published: 21 Apr 2023
|
|
CW APAC April 2023 – Trend Watch: Business applications
EZINE:
Tech's role in the workplace continues to grow. In this handbook, focused on business applications in the Asia-Pacific region, Computer Weekly looks at industry cloud platforms, how microservices improve customer experience, what automation brings to banking and Rimini Street's approach to third-party support
Posted: 20 Apr 2023 | Published: 20 Apr 2023
|
|
10 data lake uses for enterprises
INFOGRAPHIC:
Data lakes have become an essential tool for the modern data management platform. They provide a scalable and cost-effective platform for storing and managing large volumes of data, and they support real-time data analysis and processing. This infographic highlights ten cases in which data lakes are critical for modern data management.
Posted: 20 Apr 2023 | Published: 20 Apr 2023
|
|
2023 IT Priorities APAC Report
EGUIDE:
IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.
Posted: 14 Apr 2023 | Published: 14 Apr 2023
|
|
Infographic: IT Priorities 2023 APAC Budget and Buying Patterns
INFOGRAPHIC:
Each year, Computer Weekly asks IT decision-makers what projects they have planned for the coming year and this year's results show that IT leaders across APAC remain bullish about spending despite macroeconomic headwinds as they continue to invest in strategic areas. Download this infographic to find out more about the results.
Posted: 05 Apr 2023 | Published: 06 Apr 2023
|
|
Computer Weekly – 4 April 2023: Revitalising UK digital government
EZINE:
In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
Posted: 03 Apr 2023 | Published: 04 Apr 2023
|
|
Video: IT Priorities 2023 APAC
VIDEO:
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
Posted: 30 Mar 2023 | Premiered: 30 Mar 2023
|
|
Will data centers become obsolete?
EGUIDE:
Many organizations want to simplify or scale down their data centers -- but they won't disappear. Admins can examine as-a-service options and cloud to offload some applications.
Posted: 29 Mar 2023 | Published: 29 Mar 2023
|
|
A Computer Weekly buyer's guide to data visualisation
ESSENTIAL GUIDE:
Data visualisation is proving its value throughout a period of economic uncertainty. In this 16-page buyer’s guide, Computer Weekly looks at the rise of embedded analytics, the advantages of real-time data and Siemens’ exploration of industrial metaverse use cases
Posted: 27 Mar 2023 | Published: 28 Dec 2022
|
|
Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?
EZINE:
In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.
Posted: 27 Mar 2023 | Published: 28 Mar 2023
|
|
Centralized vs. decentralized identity management explained
EGUIDE:
In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.
Posted: 24 Mar 2023 | Published: 24 Mar 2023
|
|
4 ChatGPT cybersecurity benefits for the enterprise
EGUIDE:
As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.
Posted: 24 Mar 2023 | Published: 24 Mar 2023
|
|
White box networking use cases and how to get started
EGUIDE:
Rising cloud costs have prompted organizations to consider white box switches to lower costs and simplify network management. In this article, learn more about white box networking and its main uses.
Posted: 20 Mar 2023 | Published: 20 Mar 2023
|
|
What's all this talk about data mesh?
EGUIDE:
Data mesh is a new approach aims to make data more accessible, usable and valuable to the organization by creating a more flexible, scalable and collaborative data architecture. In this article, we point out some of the benefits and challenges of data mesh, and how to set up the right culture and infrastructure to make the most of this approach.
Posted: 20 Mar 2023 | Published: 20 Mar 2023
|
|
12 top enterprise risk management trends in 2023
EGUIDE:
Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
Posted: 20 Mar 2023 | Published: 20 Mar 2023
|
|
8 green computing best practices
EGUIDE:
The overall amount of energy used in data centers is massive: the International Energy Agency (IEA) estimated that data centers used up to 1.3% of the electricity consumed worldwide in 2021. Here are eight green computing practices to make data centers more energy-efficient and sustainable, with both environmental and business benefits.
Posted: 20 Mar 2023 | Published: 20 Mar 2023
|
|
Computer Weekly – 21 March 2023: The risks of an imbalance in AI
EZINE:
In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.
Posted: 17 Mar 2023 | Published: 21 Mar 2023
|
|
Business email compromise prevention tips
INFOGRAPHIC:
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
6 user authentication types to secure networks
EGUIDE:
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
CW APAC: Buyer's guide to SASE
ESSENTIAL GUIDE:
Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
Posted: 15 Mar 2023 | Published: 15 Mar 2023
|
|
Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
EZINE:
In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
Posted: 13 Mar 2023 | Published: 14 Mar 2023
|
|
Infographic: Business email compromise red flags
INFOGRAPHIC:
Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023
|
|
Comparing Azure Active Directory options
INFOGRAPHIC:
Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023
|