ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Password Security Guidelines

    Sponsored by: TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • Executive Interview: Unleashing blockchain's potential

    Sponsored by: TechTarget ComputerWeekly.com

    Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.

  • Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access

    Sponsored by: Palo Alto Networks

    As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.

  • Making Sense of Zero-Trust Security

    Sponsored by: TechTarget

    As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.

  • Computer Weekly Buyer's Guide: Identity and Access Management

    Sponsored by: TechTarget ComputerWeekly.com

    When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.

  • Computer Weekly – 19 January 2021: The UK's struggle with digital schooling

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.

  • Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • Computer Weekly – 8 October 2019: Showcasing the potential of 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.

  • IAM: Managing identity remains key to cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • How long does it take to get owned?

    Sponsored by: TechTarget ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • The great IAM - time to modernise?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub

    Sponsored by: TechTarget ComputerWeekly.com

    This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.

  • IAM: Key to security and business success in the digital era

    Sponsored by: TechTarget ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

  • CW Europe – December 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • Why IAM policies are crucial post pandemic

    Sponsored by: Beta Systems

    Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management (IAM). Find out why IAM policies are crucial in the new normal.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.