EGUIDE:
Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
EZINE:
In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
EZINE:
In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
ESSENTIAL GUIDE:
Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
EZINE:
In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
EDITORIAL RESOURCE GUIDE:
This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
EGUIDE:
Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
WHITE PAPER:
Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.