Why Machine Identity Security is Essential to Your Zero Trust Strategy
sponsored by CyberArk
WEBCAST:
While identity security continues to mature as a key topic of discussion for cloud-native developers, machine identities are often overlooked. In this webinar, join CyberArk’s DevSecOps experts to lay the foundation for your machine identity security strategy and to learn best practices to secure machine identities.
Posted: 18 Dec 2024 | Premiered: Dec 18, 2024
|
|
|
Unlock the benefits of secrets management SaaS
sponsored by CyberArk
WEBCAST:
This webinar will guide you in transitioning to a centralized SaaS secrets management solution integrated with the CyberArk Identity Security Platform. Learn about the best practices and common pitfalls of moving from on-premises to cloud-based solutions for managing secrets and machine identities.
Posted: 18 Dec 2024 | Premiered: Dec 18, 2024
|
|
|
Computer Weekly – 26 November 2024: The 50 most influential women in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we reveal the most influential women in UK technology for 2024. Read an interview with the winner, co-CEO of Tech She Can, Sheridan Ash. And meet this year's rising stars – six women with a bright future in IT leadership. Read the issue now.
Posted: 25 Nov 2024 | Published: 26 Nov 2024
|
|
|
Adventures in AI at Tripadvisor
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how travel site Tripadvisor is embracing AI to offer new products and services to its users. Gartner says the chance of a successful digital project is like 'flipping a coin' – we went to its annual IT leadership symposium to ask why. Read the issue now.
Posted: 15 Nov 2024 | Published: 19 Nov 2024
|
|
|
Computer Weekly – 12 November 2024: Innovating with weather data at the Met Office
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.
Posted: 11 Nov 2024 | Published: 12 Nov 2024
|
|
|
5 Critical Security Callouts to Know in 2024
sponsored by Cisco
INFOGRAPHIC:
Cisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.
Posted: 09 May 2024 | Published: 09 May 2024
|
|
|
Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024
|
|
|
CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE:
Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023
|
|
|
Centralized vs. decentralized identity management explained
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.
Posted: 24 Mar 2023 | Published: 24 Mar 2023
|
|
|
Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023
|
|
|
Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023
|
|
|
Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023
|
|
|
The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023
|
|
|
Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023
|
|
|
Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
Posted: 12 Nov 2021 | Published: 16 Nov 2021
|
|
|
Computer Weekly Buyer's Guide: Identity and Access Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.
Posted: 08 Feb 2021 | Published: 27 Jan 2021
|
|
|
Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Jan 2021
|
|
|
A Computer Weekly e-Guide to IAM
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 08 Feb 2021 | Published: 10 Dec 2020
|
|
|
Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 08 Feb 2021 | Published: 20 Oct 2020
|
|
|
The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019
|
|
|
IAM: Key to security and business success in the digital era
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 08 Feb 2021 | Published: 15 Nov 2018
|
|
|
eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE:
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009
|
|
|
Presentation Transcript: Accelerating Return-On-Investment with Roles Management
sponsored by Oracle Corporation
PRESENTATION TRANSCRIPT:
This paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations.
Posted: 12 Feb 2009 | Published: 12 Feb 2009
|
|
|
Using Microsoft Active Directory in the Domino World
sponsored by PistolStar, Inc.
WHITE PAPER:
Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
Posted: 10 Feb 2009 | Published: 10 Feb 2009
|
|