Issue OverviewComputer Weekly - 27 August 2013
In this week's Computer Weekly, we look at how the internet will soon be dominated by machines and sensors, rather than people, and examine the challenges posed by the internet of things. We also look at how to protect an organisation’s data assets from security breaches. And how will SAP’s cloud and in-memory expansion affect existing customers? Read the issue now. Access >>>
Premium Content for Free.
Attackers are in the network, now what?
by Warwick Ashford
If attackers are inside the network, can disguise themselves and get close to sensitive corporate data, how can data be defended?
- Attackers are in the network, now what? by Warwick Ashford
Lancashire NHS Trust deploys Yellowfin mobile BI to enhance care
by Brian McKenna
NHS Trust is using a mobile business intelligence system from Yellowfin to improve clinician performance and patient healthcare
- Lancashire NHS Trust deploys Yellowfin mobile BI to enhance care by Brian McKenna
More Premium Content Accessible For Free
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...
Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.