computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Delta
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Web Seminar

Workshop - How to own the Zoom: the art of brilliant speaking online

Communications

Workshop - How to own the Zoom: the art of brilliant speaking online

Learn how to connect to others and speak authoritatively - even when you're addressing a screen

clock 05 November 2020 • 2 min read
 3 keys to getting business buy-in for an enterprise wide back-up and recovery strategy

Security

3 keys to getting business buy-in for an enterprise wide back-up and recovery strategy

3 keys to getting business buy-in for an enterprise wide back-up and recovery strategy

clock 30 January 2014 •
Securing your website against hackers and malware

Security

Securing your website against hackers and malware

Securing your website against hackers and malware

clock 30 January 2014 •
Third party applications - a chink in your armour

Security Technology

Third party applications - a chink in your armour

Third party applications - a chink in your armour. During this web seminar we will explore how to mitigate the risk from third party applications using a step by step guide to patch management as part of a complete endpoint security management programme....

clock 12 December 2012 •
Why better data governance means better business

Legislation and Regulation

Why better data governance means better business

Organisations don't leave their cash to look after itself, so why do they do so with data?

clock 23 November 2012 •
How SMEs can punch above their weight (Available on-demand)

Security

How SMEs can punch above their weight (Available on-demand)

Join me Stuart Sumner, as our expert panel looks at what organisations of the same size as yours are doing as we discover why small is usually more beautiful than big.

clock 21 November 2012 •
Risk Based Security Management - Corporate reality or wishful thinking?

Threats and Risks

Risk Based Security Management - Corporate reality or wishful thinking?

A survey reveals the dangerous disconnect between policy and reality

clock 02 November 2012 •
How and why: moving legacy applications to the cloud

Security

How and why: moving legacy applications to the cloud

LIVE 17th SEPTEMBER: As with all technologies, there is an optimum level of cloud deployment at which the functional, business and financial benefits are all maximised. Most organisations have not yet achieved this level. The reason? Legacy and mission-critical...

clock 06 September 2012 •
The on-premise vs cloud equation: where now  for enterprise applications? (Available on-demand)

Applications

The on-premise vs cloud equation: where now for enterprise applications? (Available on-demand)

(Available on-demand) The on-premise vs cloud equation: where now for enterprise applications?

clock 11 July 2012 •
 Managing mobile devices - The BYOD challenge

Mobile

Managing mobile devices - The BYOD challenge

Live 12th July. While smartphones, tablets, ultrabooks, media players and other devices are becoming more prevalent, and staff more mobile, there is strong evidence of an emerging tension within UK industry and public sector bodies. The most common response...

clock 04 July 2012 •
123
Most read
01

Microsoft warns of massive surge in Linux XorDdos malware usage

23 May 2022 • 3 min read
02

Google Russia to file for bankruptcy after accounts seized

20 May 2022 • 2 min read
03

Developing: Cyberattack affects Port of London website

24 May 2022 • 1 min read
04

Application security: shift-left is necessary but insufficent

20 May 2022 • 4 min read
05

Exit interview: Graeme Hackland, Williams Racing CIO, leaving next month

18 May 2022 • 7 min read
  • Contact Us
  • Marketing Solutions
  • About Incisive Media
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
right wallpaper ad

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR
right wallpaper ad
Loading