RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
EZINE:
German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
EZINE:
The managed service model has swept the channel in recent years and looks like the approach for the long term – but does it need to change? Also, read about how to best prepare for an AI-driven future, as well as celebrate e92plus's 35 years as a distributor
EBOOK:
Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
VIDEO:
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
RESEARCH CONTENT:
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
ESSENTIAL GUIDE:
Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
RESEARCH CONTENT:
In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act