EDITORIAL RESOURCE GUIDE:
Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
EZINE:
In a country like Sweden which has embraced IT to transform life and work and where concepts like cashless society are welcomed by many, the proliferation of artificial intelligence is inevitable.
EZINE:
In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.
EZINE:
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
EZINE:
It's taken a while, but the latest Microsoft OS is having an impact – read all about the journey to Windows 11, as well as the uptake of co-innovation and co-creation strategies in the channel, and Broadcom's acquisition of VMware
EZINE:
In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.
EBOOK:
In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
EGUIDE:
The EMM market is growing at a rapid pace. To stay on top of your mobile strategy, organizations should be aware of a number of trends. In this e-guide compare mobile device management products, trends, and more to implement the most effective mobile strategy for your organization.
EBOOK:
As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.