EZINE:
In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
EGUIDE:
This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
EZINE:
In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.
EZINE:
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.
EZINE:
In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.
EGUIDE:
Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
RESEARCH CONTENT:
Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
EGUIDE:
Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?
RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.