ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget ComputerWeekly.com

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

  • Video: IT Priorities 2023 APAC

    Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.

  • Will data centers become obsolete?

    Many organizations want to simplify or scale down their data centers -- but they won't disappear. Admins can examine as-a-service options and cloud to offload some applications.

  • A Computer Weekly buyer's guide to data visualisation

    Data visualisation is proving its value throughout a period of economic uncertainty. In this 16-page buyer’s guide, Computer Weekly looks at the rise of embedded analytics, the advantages of real-time data and Siemens’ exploration of industrial metaverse use cases

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

  • Centralized vs. decentralized identity management explained

    In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.

  • 4 ChatGPT cybersecurity benefits for the enterprise

    As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.

  • White box networking use cases and how to get started

    Rising cloud costs have prompted organizations to consider white box switches to lower costs and simplify network management. In this article, learn more about white box networking and its main uses.

  • What's all this talk about data mesh?

    Data mesh is a new approach aims to make data more accessible, usable and valuable to the organization by creating a more flexible, scalable and collaborative data architecture. In this article, we point out some of the benefits and challenges of data mesh, and how to set up the right culture and infrastructure to make the most of this approach.

  • 12 top enterprise risk management trends in 2023

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

  • 8 green computing best practices

    The overall amount of energy used in data centers is massive: the International Energy Agency (IEA) estimated that data centers used up to 1.3% of the electricity consumed worldwide in 2021. Here are eight green computing practices to make data centers more energy-efficient and sustainable, with both environmental and business benefits.

  • Computer Weekly – 21 March 2023: The risks of an imbalance in AI

    In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.

  • Business email compromise prevention tips

    It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.

  • 6 user authentication types to secure networks

    The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

  • CW APAC: Buyer's guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

  • Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records

    In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.

  • Infographic: Business email compromise red flags

    Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.

  • Comparing Azure Active Directory options

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • Computer Weekly – 7 March 2023: Can the UK keep its fintech crown?

    In this week's Computer Weekly, two years after the Kalifa report laid out a roadmap for continued fintech sector growth, UK entrepreneurs and startups are worried about the lack of progress. We look at the top tech trends in retail and find out which companies are leading the way. And we examine six ways to slash IT emissions. Read the issue now.

  • Identity trends for 2023

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • AI in Fraud Management: Uses cases, benefits and challenges

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • Computer Weekly – 28 February 2023: The race to net zero

    In this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.

  • 2023 IT Salary & Career Survey

    Our IT Salary & Career Study is now underway and we need your help to determine the current trends in employment & salaries. As a valued Computer Weekly member, you're invited to share your experience by completing this survey. It only takes a few minutes to complete and you'll also be one of the first to receive a detailed survey report.

  • CW EMEA - March 2023: How Sweden is accelerating digitisation

    In this month's CW EMEA, we find out how the CIO at Dutch company SHV Holdings goes about ensuring his group IT department provides the foundations for a wide variety of businesses to thrive digitally. Read the issue now.

  • Inclusion = everyone: Expert advice for improving tech diversity

    At the Computer Weekly diversity in tech event, experts proposed a 15-point plan to improve diversity and inclusion across the industry. Suggestions focused on getting people into the sector and keeping them there. Download the full report here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.