• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Internet of Things

The perils of the smart city
The perils of the smart city

There will be more than 50 billion smart devices in the world by 2030, managing and monitoring everything from our health to our roads. But what are the pros and cons of handing city management over to the IoT?

  • Internet of Things
  • 19 January 2021
Can regulation solve businesses' IoT security woes?
Can regulation solve businesses' IoT security woes?

IoT manufacturers are waking up to the fact that they have responsibilities - even if it hurts their bottom line

  • Internet of Things
  • 04 January 2021
Bosch Power Tools' metamorphosis into a data company with Kafka
Bosch Power Tools' metamorphosis into a data company with Kafka

'The overarching goal is to connect all the devices so we can have an overview from birth to trash'

  • Big Data and Analytics
  • 21 September 2020
Partner Insight: Don't underestimate the IoT as a security priority
Partner Insight: Don't underestimate the IoT as a security priority

  • Internet of Things
  • 07 August 2020
Cutting fleet car costs with telemetry
Cutting fleet car costs with telemetry

Telemetry can open a window on the murky world of fleet vehicle usage, says Total WayKonect

  • Big Data and Analytics
  • 29 April 2020
Choosing a database in the multi-cloud era
Choosing a database in the multi-cloud era

Cloud, mobile, social media, big data, IoT and organisations operating in real-time on a global scale have driven sweeping changes to the database arena

  • Cloud Computing
  • 28 April 2020
Why open - not closed - is best practice both in the data centre and at the edge
Why open - not closed - is best practice both in the data centre and at the edge

No single vendor can provide a complete edge computing solution - the edge requires collaboration

  • Internet of Things
  • 16 April 2020
UK smart home energy platform Living Lab moves forward with cloud-based analytics
UK smart home energy platform Living Lab moves forward with cloud-based analytics

Living Lab 2.0 is a test environment for businesses seeking to innovate in the home energy market

  • Cloud Computing
  • 09 April 2020
Peter Cochrane: Coronavirus as a change agent
Peter Cochrane: Coronavirus as a change agent

Could the coronavirus outbreak instigate a broader change for the better in society? Professor Peter Cochrane believes it could

  • Cloud and Infrastructure
  • 01 April 2020
From million-cluster deployments to the IoT: Rancher Labs' goals for Kubernetes
From million-cluster deployments to the IoT: Rancher Labs' goals for Kubernetes

Rancher has big - and small - plans for the container orchestration platform

  • DevOps
  • 31 March 2020
The smart grid future can only be open source says energy firm Alliander
The smart grid future can only be open source says energy firm Alliander

As more renewable energy sources come online grids and market mechansims are changing and controlling them must be a collaborative effort, says director of systems operations Arjan Stam

  • Internet of Things
  • 25 March 2020
How IoT technology can help IT teams create the ideal workspace of the future
How IoT technology can help IT teams create the ideal workspace of the future

A truly smart office means greater productivity and fewer headaches for IT teams

  • Internet of Things
  • 19 February 2020
Government plans new laws to mandate minimum security standards for consumer IoT devices
Government plans new laws to mandate minimum security standards for consumer IoT devices

Government expected to push for legal recognition of emerging TS 103 645 global IoT security standard

  • Security
  • 27 January 2020
Proof of concept versus production deployments: The case for an enterprise IoT model
Proof of concept versus production deployments: The case for an enterprise IoT model

Connecting production IoT devices to a public network might be tempting, but a private IoT network will be more secure and reliable, argues Comms365's Nick Sacke

  • Security
  • 22 January 2020
Carnival Corp's edge computing could change the face of the travel industry
Carnival Corp's edge computing could change the face of the travel industry

Can intelligence-led service introduce cruise travel to a younger generation?

  • Internet of Things
  • 06 January 2020
Amazon announces longer-range Sidewalk wireless network for IoT devices
Amazon announces longer-range Sidewalk wireless network for IoT devices

Sidewalk will use low-bandwidth 900 megahertz spectrum to enable communication with IoT devices a mile away

  • Communications
  • 26 September 2019
Facebook buys computer mind-reading start-up CTRL-labs in $1bn deal
Facebook buys computer mind-reading start-up CTRL-labs in $1bn deal

CTRL-labs is developing technology to enable computers to be controlled by the brain

  • Internet of Things
  • 24 September 2019
Smart TVs are leaking data to companies like Google, Facebook and Amazon, researchers warn
Smart TVs are leaking data to companies like Google, Facebook and Amazon, researchers warn

Ad trackers 'pervasive' across Roku and Amazon set-top boxes

  • Privacy
  • 20 September 2019
Autonomous weapons could 'accidentally' start the next world war, warns ex-Google engineer
Autonomous weapons could 'accidentally' start the next world war, warns ex-Google engineer

Laura Nolan, who resigned from Google last year over military drone project, warns over 'killer robots'

  • Big Data and Analytics
  • 16 September 2019
Russian hackers targeting IoT devices to penetrate corporate networks, warns Microsoft
Russian hackers targeting IoT devices to penetrate corporate networks, warns Microsoft

IoT devices the 'soft underbelly' of corporate networks by Russia's Fancy Bear hackers, targeting VoIP phones and printers

  • Threats and Risks
  • 06 August 2019
Microsoft announces general availability of Azure Security Centre for IoT
Microsoft announces general availability of Azure Security Centre for IoT

IoT Azure security tool can identify configuration issues before they can be used in a cyber attack

  • Security Technology
  • 30 July 2019
IT security specialists need to look at IoT security in buildings in a completely different way, says Cundall director Chris Grundy
IT security specialists need to look at IoT security in buildings in a completely different way, says Cundall director Chris Grundy

The construction industry still hasn't got to grips with the IT security challenges of IoT devices embedded in buildings

  • Big Data and Analytics
  • 12 July 2019
Silex malware targeting IoT devices spotted by security researchers
Silex malware targeting IoT devices spotted by security researchers

Silex attacks any Unix-like system with default login credentials

  • Security
  • 26 June 2019
Ocado 'going into production' imminently on robotic picking with in-house developed suction cup tech
Ocado 'going into production' imminently on robotic picking with in-house developed suction cup tech

Full-scale working robotic hands to follow in three-to-five year

  • Hardware
  • 17 June 2019
123

Most read

Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading