EZINE:
In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
EGUIDE:
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
RESOURCE:
Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
WHITE PAPER:
While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue.
WHITE PAPER:
This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
WHITE PAPER:
How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
CASE STUDY:
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
EGUIDE:
In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
EZINE:
In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.