• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

identity and access management

Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat

Identity management underwent dramatic changes following the coronavirus pandemic - including the leading vendors' positions

  • Security Technology
  • 14 January 2021
How has the global pandemic changed identity management?
How has the global pandemic changed identity management?

Cloud-first vendors are making big gains as the remote working trend accelerates

  • Security
  • 23 September 2020
Deskflix: Who are you and how can I be sure?
Deskflix: Who are you and how can I be sure?

Identity and access management can be a tricky balancing act to get right

  • Business Software
  • 14 September 2020
Deskflix Season Seven: Identity and access management
Deskflix Season Seven: Identity and access management

Identity and access management has become even more important in the remote working revolution

  • Security
  • 25 August 2020
Please, I'm Ben Todd and there's only one of me: The case for a unified identity
Please, I'm Ben Todd and there's only one of me: The case for a unified identity

We need a single digital identity to authenticate us at work, prove who we are to our energy company, and let us log in seamlessly to our favourite news site

  • Privacy
  • 20 July 2020
Are your customers who they say they are?
Are your customers who they say they are?

Identity is at the heart of digital transformation

  • Strategy
  • 02 June 2020
Keeping your remote workforce secure during the pandemic
Keeping your remote workforce secure during the pandemic

Cybercrime is rising sharply as opportunistic and immoral criminals take advantage of the disruption

  • Security
  • 07 May 2020
Deskflix Season One: Empowering the Remote Working Revolution
Deskflix Season One: Empowering the Remote Working Revolution

Join us for the first part of our virtual event series

  • Strategy
  • 05 May 2020
When hunting for a new IT solution, understand the problem first
When hunting for a new IT solution, understand the problem first

Ian Hill of BAM Group warns against being distracted by bells and whistles

  • Security Technology
  • 19 March 2020
Rolling out single-sign-on and IAM at Plan International
Rolling out single-sign-on and IAM at Plan International

Security, ease of use and cloud first are technology priorities for the children's charity, says IT head Jon Winder

  • Business Software
  • 09 September 2019
Online identity: With the failure of Gov.UK Verify should Britain follow the Nordic model?
Online identity: With the failure of Gov.UK Verify should Britain follow the Nordic model?

UK should consider adopting Norway's BankID model, says Signicat's John Erik Setsaas

  • Privacy
  • 17 December 2018
Do you know about the power of privileged access?
Do you know about the power of privileged access?

Attackers often target superuser accounts with access to data and systems - how do you protect them?

  • Threats and Risks
  • 07 December 2018
Machine identities are just as important to protect as humans'
Machine identities are just as important to protect as humans'

Protecting human identities is important for businesses - and machines are the same

  • Privacy
  • 30 August 2018
NHS Digital plans to roll out services based on Gov.UK Verify from October
NHS Digital plans to roll out services based on Gov.UK Verify from October

One digital identity to rule all health service 'interactions'?

  • Strategy
  • 05 April 2017
IoT: security first, innovation second?
IoT: security first, innovation second?

Securing identity data for IoT environments must be a foundation of identity and access management infrastructure, says Hans Zandbelt

  • Internet of Things
  • 03 February 2017
Cloud security: The top tips from the experts
Cloud security: The top tips from the experts

Computing asked the experts for their top tips to help businesses use the cloud securely. Here's what they said

  • Cloud and Infrastructure
  • 15 September 2016
Blockchain: not the Messiah
Blockchain: not the Messiah

Blockchain is an ingenious technological development, but it's far from being the saviour many are looking for

  • Business Software
  • 16 February 2016
Government should adopt blockchain to improve public services, claims UK's chief scientist
Government should adopt blockchain to improve public services, claims UK's chief scientist

'It has the potential to redefine the relationship between government and the citizen in terms of data sharing, transparency and trust,' says Sir Mark Walport

  • Government
  • 19 January 2016
The Children's Society aims to drive efficiency with e-documents and mobile working
The Children's Society aims to drive efficiency with e-documents and mobile working

Technology-driven efficiency drive at 134-year-old children's charity

  • Business Software
  • 11 January 2016
Five reasons why fintech is at the forefront of the privacy revolution
Five reasons why fintech is at the forefront of the privacy revolution

Issues of privacy, trust and security come to a head in the fast-moving world of financial technology, as John Leonard finds out

  • Privacy
  • 03 December 2015
Report - IT departments hindering data access as only 46 per cent of top execs can get the information they require
Report - IT departments hindering data access as only 46 per cent of top execs can get the information they require

PwC and Iron Mountain report alleges IT can be unnecessary impediment to the exploitation of business data

  • Compliance
  • 05 November 2015
Abuse consumers' personal data and your business will be destroyed, says Ariadne Capital MD Amit Pau
Abuse consumers' personal data and your business will be destroyed, says Ariadne Capital MD Amit Pau

'Those brands that do not actually embrace the fact that it's my data and that I need to accrue economic value will no longer be in business,' says VC head

  • Privacy
  • 26 October 2015
For Ping Identity, winning a Computing Vendor Excellence Award is validation for its 'next-gen' access management platform
For Ping Identity, winning a Computing Vendor Excellence Award is validation for its 'next-gen' access management platform

'All of the hard work we've put in behind the scenes is worth it,' says Ping Identity's Clare Rees

  • Product
  • 02 September 2015
Identity and access management: CIOs discuss the trials and pitfalls
Identity and access management: CIOs discuss the trials and pitfalls

How hard is IAM to properly control and implement? Twelve Computing IT Leaders Club members give their views

  • Services and Outsourcing
  • 05 August 2015

Most read

Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
Twitter CEO defends Trump ban while Telegram purges far-right channels
Twitter CEO defends Trump ban while Telegram purges far-right channels
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading