RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
EZINE:
In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
CASE STUDY:
Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
RESOURCE:
State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
EZINE:
In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.
WHITE PAPER:
While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue.
EZINE:
In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.
EGUIDE:
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
EGUIDE:
In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
WHITE PAPER:
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).