User ID Management Reports

Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

Computer Weekly – 4 April 2023: Revitalising UK digital government
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
Posted: 03 Apr 2023 | Published: 04 Apr 2023

TechTarget ComputerWeekly.com

Computer Weekly – 5 March 2024: Authorised access only – biometrics in the workplace
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.
Posted: 04 Mar 2024 | Published: 05 Mar 2024

TechTarget ComputerWeekly.com

Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
Posted: 12 Nov 2021 | Published: 16 Nov 2021

TechTarget ComputerWeekly.com

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Oct 2018

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 12 December 2023: Shaping the modern workplace
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.
Posted: 11 Dec 2023 | Published: 12 Dec 2023

TechTarget ComputerWeekly.com

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.
Posted: 17 Oct 2021 | Published: 19 Oct 2021

TechTarget ComputerWeekly.com

The Future of Identity and Access Management Tools
sponsored by Jumio
EGUIDE: Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio