computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

i&am

User acceptance: the biggest I&AM hurdle

Security Technology

User acceptance: the biggest I&AM hurdle

The holy grail of I&AM is to actually improve the user experience while making the business more secure, but most organisations are a long way from that

clock 18 September 2020 • 2 min read
Escaping 'Password Hell': biometrics of IT and security

Security Technology

Escaping 'Password Hell': biometrics of IT and security

Microchip implants? Bring 'em on I say!

clock 22 June 2020 • 3 min read
Deskflix Season One: Empowering the Remote Working Revolution

Strategy

Deskflix Season One: Empowering the Remote Working Revolution

Join us for the first part of our virtual event series

clock 05 May 2020 •
Hitachi Capital rolls out identity-as-a-service to handle huge rise in loan applications post-lockdown

Security Technology

Hitachi Capital rolls out identity-as-a-service to handle huge rise in loan applications post-lockdown

Lender is extending its use of Nomidio IDV to speed application processing for the UK government's Coronavirus Business Interruption Loan Scheme (CBILS)

clock 21 April 2020 •
Most read
01

Brexit is having a negative impact, say 47% of UK IT leaders

15 August 2022 • 2 min read
02

Hackers holding NHS IT to ransom

12 August 2022 • 2 min read
03

Microsoft warns of Russian 'Seaborgium' phishing, reconnaissance activities

17 August 2022 • 2 min read
04

South Staffordshire Water victim of cyber attack, customers not at risk

16 August 2022 • 2 min read
05

Darktrace confirms takeover proposal by US private equity firm Thoma Bravo

17 August 2022 • 2 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA
New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896

Loading