EGUIDE:
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
EGUIDE:
While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
EZINE:
In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.
EZINE:
In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.
EGUIDE:
Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.
EZINE:
In this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.
INFOGRAPHIC:
An organization's data is one of its most valuable assets and must be protected accordingly. Because there are so many ways data can potentially be compromised, organizations must take a multifaceted approach to ensure the well-being of their data. This means focusing on three key areas: data protection, data security and data privacy.
EBOOK:
In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
EZINE:
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
EZINE:
In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.