EZINE:
Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.
EZINE:
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
EGUIDE:
As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
EZINE:
In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
EGUIDE:
Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
EGUIDE:
In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
EGUIDE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
EBOOK:
Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
EGUIDE:
Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more.