EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.
EGUIDE:
In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.
INFOGRAPHIC:
A cybersecurity strategy isn't meant to be perfect, but it must be proactive, effective, actively supported and evolving. Here are the four steps required to get there.
EZINE:
In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
WHITE PAPER:
This paper details 6 key cybersecurity tactics to reduce risk. It offers advice on comprehending attack surfaces, fortifying endpoints, limiting external protocols, enforcing robust MFA, boosting monitoring, and refining incident response. For an in-depth look at these proactive measures, read it now.
EZINE:
In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
EZINE:
In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.
EZINE:
In this week's Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK's fastest supercomputer. Read the issue now.
EGUIDE:
AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
EGUIDE:
According to cybersecurity company Trellix, the number of vishing attacks in Q4 2022 increased by 142% from Q3 2022. Although the volume of vishing attacks continues to rise, threat researchers say that the role of AI technology in these attacks may have been overestimated.