ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
RESEARCH CONTENT:
This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
EGUIDE:
From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
EZINE:
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
EZINE:
In this week's Computer Weekly, we talk to the CIO of Warner Music about how cloud computing helps it meet the needs of music lovers. AstraZeneca discusses how its enterprise social media system helped through the pandemic. And we assess the tech sector's response to the government's plans to tackle digital skills shortages. Read the issue now.
EZINE:
In this week's Computer Weekly, as demands for networking performance and speed increase, we examine how to keep a handle on costs. Chip makers are investing in PLC flash technology but some think it won't be worth the effort; we investigate. And we listen in as tech industry leaders and politicians discuss the regulation of AI. Read the issue now.
ANALYST REPORT:
Download this IDC report for your roadmap on establishing secure remote connectivity for both agile and productive business operations. Inside the data-rich report, learn how to obtain a 360-degree security posture, to get the most from your connectivity platform, and to view essential guidance to get you started.
EGUIDE:
The Covid-19 pandemic has transformed our networking habits. In this 17-page buyer's guide, Computer Weekly looks at how firms are coping with the shift to remote working, the new challenges facing IT leaders and the alternatives to strained virtual private networks.
EGUIDE:
Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
EGUIDE:
Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.