EGUIDE:
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
EGUIDE:
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
EZINE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
EZINE:
In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
WHITE PAPER:
Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
WHITE PAPER:
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
WHITE PAPER:
Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
JOURNAL ARTICLE:
In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.