EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
EZINE:
In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
EZINE:
In this week's Computer Weekly, Rishi Sunak and Keir Starmer both spoke at London Tech Week to present their visions of an AI future for the UK – we compare their plans. We talk to the CTO of chip giant AMD about making tech more energy efficient. And we look at optimising networks for hybrid working. Read the issue now.
EZINE:
In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.
EZINE:
In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
EGUIDE:
The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.
WEBCAST:
Watch this webinar to hear from a panel of experts from IDC, Google Cloud, and partners discuss how they are putting data, analytics, and the power of artificial intelligence to work via the cloud.
WHITE PAPER:
Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.
EGUIDE:
Read this e-book to gain guidance on how to establish an employee-centric digital workplace, including must-see security considerations for which everyone is responsible.