Executive Interview: Unleashing blockchain's potential
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021
|
|
|
Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE:
As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 26 Mar 2021 | Published: 01 May 2021
|
|
|
Computer Weekly Buyer's Guide: Identity and Access Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.
Posted: 08 Feb 2021 | Published: 27 Jan 2021
|
|
|
Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Jan 2021
|
|
|
Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2021
|
|
|
A Computer Weekly e-Guide to IAM
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 08 Feb 2021 | Published: 10 Dec 2020
|
|
|
Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 08 Feb 2021 | Published: 20 Oct 2020
|
|
|
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020
|
|
|
Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019
|
|
|
IAM: Managing identity remains key to cyber security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 08 Feb 2021 | Published: 29 Aug 2019
|
|
|
Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
How long does it take to get owned?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 08 Feb 2021 | Published: 23 Apr 2019
|
|
|
The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019
|
|
|
Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE:
This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018
|
|
|
IAM: Key to security and business success in the digital era
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 08 Feb 2021 | Published: 15 Nov 2018
|
|
|
Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Oct 2018
|
|
|
Computer Weekly – 10 July 2018: Tackling the digital identity problem
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Jul 2018
|
|
|
CW Europe – December 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 08 Feb 2021 | Published: 14 Dec 2017
|
|
|
CW Nordics May 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
Posted: 08 Feb 2021 | Published: 25 May 2017
|
|
|
Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 May 2017
|
|
|
CW Benelux - May 2017: 3D printing on the rise
sponsored by TechTarget ComputerWeekly.com
EZINE:
Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.
Posted: 08 Feb 2021 | Published: 04 May 2017
|
|
|
CW ASEAN November 2016
sponsored by TechTarget Security
EZINE:
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 08 Feb 2021 | Published: 31 Oct 2016
|
|
|
Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER:
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE:
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009
|
|