• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Opinion

How to overcome IPv6 inertia
How to overcome IPv6 inertia

Technologists still struggle to convince businesses owners and decision makers to make the leap to IPv6. Marco Hogewoning, Acting Manager, Public Policy and Internet Governance at the RIPE NCC outlines the arguments

  • Internet
  • 16 July 2020
Why data sovereignty will reign in a post-Schrems 2.0 open source world
Why data sovereignty will reign in a post-Schrems 2.0 open source world

Privacy activist Max Schrem's court victory creates an ideal opportunity for open source and open data approaches, says OpenUK's Amanda Brock

  • Privacy
  • 16 July 2020
Managing open source software: lessening the load for developers
Managing open source software: lessening the load for developers

Evaluating open source projects and repositories is a time-consuming and unreliable process that can be greatly improved by an intelligent platform approach

  • Open Source
  • 09 July 2020
Scrutiny is key to the success of digital immunity passports
Scrutiny is key to the success of digital immunity passports

Is the convenience of a digital coronavirus immunity document worth the privacy concerns and investment, asks Emma Wright of law firm Kemp Little

  • Security
  • 08 July 2020
The role of AI/ML in the future of enterprise networks
The role of AI/ML in the future of enterprise networks

Advancements in network analytics are making it easier to manage SLAs

  • Networks
  • 01 July 2020
Five technology design principles to combat domestic abuse
Five technology design principles to combat domestic abuse

Measures technologists can take to ensure the products they create are resistant to coercive control

  • Developer
  • 29 June 2020
Why do tech tycoons think they're the Dalai Lama?
Why do tech tycoons think they're the Dalai Lama?

Apparently Airbnb is a spiritual movement which aims to spread love around the world and Google is here to bring us all together

  • Leadership
  • 29 June 2020
Escaping 'Password Hell': biometrics of IT and security
Escaping 'Password Hell': biometrics of IT and security

Microchip implants? Bring 'em on I say!

  • Security Technology
  • 22 June 2020
How to protect your business from coronavirus-related email phishing
How to protect your business from coronavirus-related email phishing

A few steps leaders can take before, during or after an attack to protect their companies from phishing

  • Security
  • 04 June 2020
Why moving to the cloud requires a unified support strategy
Why moving to the cloud requires a unified support strategy

  • Cloud and Infrastructure
  • 03 June 2020
Data virtualisation can help to save both lives and economies
Data virtualisation can help to save both lives and economies

By creating such a logical architecture, data virtualisation enables those fighting Covid-19 to access data quickly and from anywhere

  • Big Data and Analytics
  • 01 June 2020
Why coronavirus is going to change the way we work forever
Why coronavirus is going to change the way we work forever

The pandemic is only accelerating trends that were already happening

  • Strategy
  • 21 May 2020
Software development 2.0:  the five pillars of sustainable software development
Software development 2.0: the five pillars of sustainable software development

'Much more than a technical framework, the five pillars are a vision for how we collaborate as a function'

  • Developer
  • 20 May 2020
This golden age for fraudsters requires a new era of authentication
This golden age for fraudsters requires a new era of authentication

Covid-19 has been a goldmine for criminals, we need to get better at defending ourselves

  • Security Technology
  • 19 May 2020
UK contact tracing app: will it be effective?
UK contact tracing app: will it be effective?

Emma Wright, Partner at technology and digital specialist law firm Kemp Little, discusses the various thorny issues around the NHSX contact tracing app, including its effectiveness, the privacy issues surrounding the technology, and possible discriminatory...

  • Health
  • 15 May 2020
Software development 2.0: Achieving sustainability in an environment of constant change
Software development 2.0: Achieving sustainability in an environment of constant change

bet365's Sports Development team faced a number of severe hurdles as they looked to support and expand a rapidly growing website

  • Developer
  • 14 May 2020
Peter Cochrane: The threat of optimisation
Peter Cochrane: The threat of optimisation

The reason why Mother Nature and some civilisations enjoy longevity is down to their relative inefficiency

  • Strategy
  • 12 May 2020
Why Software Delivery Management (SDM) matters
Why Software Delivery Management (SDM) matters

SDM breaks down the walls between software delivery and cross-functional teams allowing them to communicate and collaborate better

  • DevOps
  • 11 May 2020
Keeping your remote workforce secure during the pandemic
Keeping your remote workforce secure during the pandemic

Cybercrime is rising sharply as opportunistic and immoral criminals take advantage of the disruption

  • Security
  • 07 May 2020
Covid-19 and contracting for AI: don't skip the fine print in the rush for solutions
Covid-19 and contracting for AI: don't skip the fine print in the rush for solutions

AI is different. Contractual mistakes now could have critical and expensive consequences, both in terms of human health and business viability

  • Legislation and Regulation
  • 04 May 2020
Maintaining peak performance in a cloud migration
Maintaining peak performance in a cloud migration

When migrating to the cloud-based storage to support homeworking, it's important to keep an eye on latency and read times

  • Cloud and Infrastructure
  • 04 May 2020
Proving the ROI of an API project
Proving the ROI of an API project

Identify the key KPIs to avoid unnecessary delays and complications

  • Business Software
  • 28 April 2020
Striking the balance between legal and commercial realities
Striking the balance between legal and commercial realities

Emma Stevens, a Partner in the dispute resolution team at Coffin Mew, discusses her firms advice to organisations during the COVID-19 pandemic

  • Legislation and Regulation
  • 27 April 2020
Meeting the peak: Optimising your databases to handle increased demand during lockdown
Meeting the peak: Optimising your databases to handle increased demand during lockdown

We are currently experiencing the greatest stress test in the history of the internet, here's how to make sure your systems pass

  • Databases
  • 23 April 2020
234

Most read

Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading