Government Information Security Research
-
Chancellor Rishi Sunak listens to UK tech – Computer Weekly Downtime Upload podcast
Sponsored by: TechTarget ComputerWeekly.comIn this episode of the Computer Weekly Downtime Upload podcast, CW editor in chief Bryan Glick joins Caroline Donnelly, Clare McDonald and Brian McKenna to discuss his fireside chat with Chancellor of the Exchequer Rishi Sunak at a high-level Treasury tech sector conference.
-
Lock in your security maturity through strategic mainframe modernization
Sponsored by: Ensono LimitedToday’s state and local government IT leaders are grappling with increasing vulnerabilities and threats to critical IT infrastructure as well as complex compliance requirements. Download this guide to learn how investment in mainframe modernization can help these organizations to maintain, secure and control data, applications and networks.
-
UK police unlawfully processing over a million people's data on Microsoft 365
Sponsored by: TechTarget ComputerWeekly.comThe roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
-
Computer Weekly – 7 May 2019: Nurturing innovation at DWP
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.
-
Computer Weekly – 23 October 2018: Where next for digital identity?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
-
Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
Focus: IT for government and public sector
Sponsored by: TechTarget ComputerWeekly.comIt's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
-
Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.
-
Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.
-
UK police unlawfully processing over a million people's data on Microsoft 365
Sponsored by: TechTarget ComputerWeekly.comThe roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
-
State and Local Governments Chart Their Path Toward Improved Digital Security
Sponsored by: Dell TechnologiesState and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
-
IT Security Challenges for State and Local Government IT Departments
Sponsored by: Dell TechnologiesToday's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
-
The Security Risks of Network Sensors in the Enterprise
Sponsored by: IBMIn this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
-
Computer Weekly – 5 July 2016: How will UK IT adapt after Brexit?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the aftershocks continue from the UK's decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer's guide examines expense management software. And IT leaders discuss the question – can you trust your technology? Read the issue now.
-
Computer Weekly – 5 April 2016: Seven steps to digital leadership
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.
-
Endpoint Threat Detection Gets More Response
Sponsored by: Solarwinds MSPThis white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
-
Advanced Case Management for Government
Sponsored by: IBMHow can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
-
Computer Weekly – 11 August 2015: Data unlocks personalised customer service
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.
-
Protecting Critical Data is a Main Priority for the U.S. Army
Sponsored by: GlobalscapeIn this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
-
Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
Sponsored by: IBMThis white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
-
Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
Sponsored by: IBMThis resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
-
Improved Scalability and Availability are the Keys to Better Storage Management
Sponsored by: EMC & ArrowThis white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
Sponsored by: FireEyeThis guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.