Identity and access management products
- 
				News
					29 Oct 2025
					
									
										  Rapid7: Cyber defences stuck in the 1980s as threats mountThe company’s chief product officer notes that many defence tactics are still stuck in the past, urging organisations to adopt AI-driven security platforms to improve threat detection and response Continue Reading 
- 
				Opinion
					23 Oct 2025
					
									
										  The US government shutdown is a wake-up call for cyber self-relianceAs the US government shutdown heads towards a second month, could the disruption to cyber security programmes be the impetus end-users need to pull themselves up by their own bootstraps? Continue Reading 
- 
                News
                23 Mar 2016
                  Gov.uk Verify not secure enough for NHS, says HSCICThe government’s Verify identity verification platform isn’t secure enough for the NHS, so Liverpool Clinical Commissioning Group and HSCIC are working to add extra levels of security Continue Reading By
- 
                News
                18 Mar 2016
                  Australian girls believe online harassment is endemicThere are clear signals that online threats against women and attempts to invade their privacy are becoming societal norms in Australia Continue Reading 
- 
                E-Zine
                15 Mar 2016
                  Robots at your serviceIn this week’s Computer Weekly, we find out how financial services firms are investing in artificial intelligence to create robo-advisors to help customers with financial advice online. We ask if virtual reality is ready for mainstream business adoption or is still just an over-hyped technology. And we examine the key steps needed to successfully build smart cities using internet of things and networking technologies. Read the issue now. Continue Reading 
- 
                Feature
                15 Mar 2016
                  IAM is the future for managing data securityWhy identity and access management is taking centre stage in companies’ access policies Continue Reading By- Andras Cser and Merritt Maxim
 
- 
                News
                11 Mar 2016
                  Royal Mail becomes eighth accredited Gov.uk Verify providerThe Royal Mail is the latest provider to be accredited to support the government’s Gov.uk Verify identity assurance service Continue Reading By
- 
                Opinion
                07 Mar 2016
                  The problem with passwords: how to make it easier for employees to stay secureAn organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading By- Jeremy Bergsman, CEB
 
- 
                Opinion
                03 Mar 2016
                  Security Think Tank: Top five access control mistakesIn the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading By- Tim Holman, 2-sec
 
- 
                News
                18 Feb 2016
                  Mobile innovation shifts to smartphone servicesAs smartphone sales continue to stagnate, suppliers are looking to innovate in more novel ways Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                10 Feb 2016
                  Gov.uk Verify identity system targets 50 government services for April go-liveGovernment identity assurance system is set to move from beta to live in April, three years after its original target date Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                29 Jan 2016
                  HSBC online services hit by DDoS attackHSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                21 Jan 2016
                  Candy Crush maker King secures mobile access through cloudCandy Crush maker King.com uses cloud-based Duo Security authentication for access to cloud services, customised apps and remote VPNs Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                19 Jan 2016
                  Most Android devices running outdated versionsNearly a third of Android devices in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities, a study shows Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                24 Dec 2015
                  Top 10 IT security stories of 2015Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                Guide
                07 Dec 2015
                  Essential guide to data breaches, the dark web and the hidden data economyIn this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading 
- 
                News
                27 Nov 2015
                  Word ‘smart’ being abused by IoT advocatesSpeakers at an event hosted by Cambridge Wireless say the term ‘smart’ is overused to describe connected devices on the internet of things Continue Reading By- Alex Scroxton, Security Editor
 
- 
                E-Zine
                23 Nov 2015
                  Technology helping to deliver aid for refugeesIn this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now. Continue Reading 
- 
                News
                29 Oct 2015
                  M&S data breach forces retailer to temporarily suspend serviceA glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue Continue Reading By- Clare McDonald, Business Editor
 
- 
                E-Zine
                19 Oct 2015
                  IT giants Dell and EMC uniteIn this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now. Continue Reading 
- 
                Feature
                15 Oct 2015
                  The true cost of a cyber security breach in AustraliaThe costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading 
- 
                News
                09 Oct 2015
                  Lack of trust for banks causes NHS rethink over government online identity schemeNHS trials of the Verify ID assurance system found patients concerned over using banks to allow access to medical data Continue Reading By
- 
                News
                08 Oct 2015
                  Estonian government IT initiative increases virtual populationEstonia is leading the way when it comes to providing easy and secure access to government services for citizens and foreigners alike Continue Reading By- Tarmo Virki
 
- 
                Photo Story
                06 Oct 2015
                  Aid organisations using technology to help Syrian refugees in the Middle EastTechnology is playing a crucial role in supporting humanitarian aid organisations coping with the influx of Syrian refugees in the Middle East Continue Reading By
- 
                Feature
                01 Oct 2015
                  How technology is helping deliver aid to Syrian refugees in the Middle EastThe Syrian refugee crisis has engulfed the Middle East, but technology is proving to be an essential tool to help aid organisations support displaced people Continue Reading By
- 
                News
                14 Sep 2015
                  RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theftInternational insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading By- Caroline Donnelly, Senior Editor, UK
 
- 
                News
                09 Sep 2015
                  Conventional security measures hit productivity, study showsMost IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                16 Aug 2015
                  Mobile phone users at risk as hackers bug and track victimsAn investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading By- Ross Coulthart, 60 Minutes Australia
 
- 
                News
                03 Aug 2015
                  Why the time is ripe for security behaviour analyticsRecent months have seen an uptick in announcements by security suppliers around behavioural analytics, but what is driving this trend? Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                24 Jul 2015
                  GDS targets three million new users of Gov.uk Verify service in next 12 monthsRoll-out of the system for logging in to digital public services is taking longer than expected, but user numbers are expected to grow significantly in 2015 Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                07 Jul 2015
                  Dashlane bullish about the future despite LastPass hackPassword management firm Dashlane is confident its business model will evolve and continue to be relevant even if passwords eventually disappear Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                23 Jun 2015
                  Pharmaceutical companies use BPM to cut cost of clinical trial drugsPharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                22 Jun 2015
                  Government Digital Service insists Verify safe despite claims of vulnerabilitiesAn academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case Continue Reading By- Clare McDonald, Business Editor
 
- 
                News
                12 Jun 2015
                  Government preparing to let private sector companies use its Verify identity schemeThe Cabinet Office is talking to banks, insurers and retailers to establish Gov.uk Verify identity assurance as a national scheme Continue Reading By
- 
                News
                03 Jun 2015
                  VMware puts network virtualisation to work in McAfee environmentsVMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 May 2015
                  Data classification key to IP protection, says TitusData classification can help organisations get more value out of encryption and data loss prevention systems Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                29 May 2015
                  Google announces security features for AndroidGoogle announces better app permission controls and other Android security changes at its Google I/O developer conference Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                18 May 2015
                  Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holesAt Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                11 May 2015
                  PSNGB rebrands to drive information sharing across PSNPSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                07 May 2015
                  Future IAM will need to be broader, says Martin KuppingerIdentity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                29 Apr 2015
                  Time to embrace a new level of IAM, says Martin KuppingerA new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                Feature
                25 Apr 2015
                  Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillanceAlways a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading 
- 
                E-Zine
                20 Apr 2015
                  The future of Moore's Law at 50In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading 
- 
                News
                08 Apr 2015
                  Exit checks system for UK borders finally goes liveThe Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                25 Mar 2015
                  UK government adds five authentication providers to Gov.uk Verify identity management systemThe Government Digital Service (GDS) adds five authentication providers to the Gov.uk Verify identity and access management scheme Continue Reading By- Clare McDonald, Business Editor
 
- 
                News
                27 Feb 2015
                  Case study: Norwegian insurer invests in Darktrace machine-learning cyber defenceShipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading 
- 
                News
                20 Feb 2015
                  BlackBerry 10.3.1 review: Access Android apps and BlendBlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                02 Feb 2015
                  Former Capital One data analysts charged with mining customer dataUS financial services regulator SEC charges two former employees of financial services firm Capital One with insider trading Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                17 Dec 2014
                  Cabinet Office begins procurement for next stage of Gov.uk VerifyThe Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                News
                17 Dec 2014
                  US interception in the EU faces new legal challengesUS government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries Continue Reading By- Fiona O’Cleirigh
 
- 
                E-Zine
                08 Dec 2014
                  The most influential people in UK IT 2014In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now. Continue Reading 
- 
                News
                28 Nov 2014
                  CGI secures communications between pilots and air traffic controlSatellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                Feature
                14 Nov 2014
                  The business challenges and benefits of identity and access managementIT leaders gathered at a CW500 Club meeting to hear from peers about the challenges of identity and access management Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                07 Nov 2014
                  Home Depot traces credit card data hack to supplier compromiseUS retailer Home Depot reveals its recent data breach was linked to a compromised supplier’s credentials Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                30 Oct 2014
                  Half a million citizens to be using Gov.uk Verify by April 2015Government now expects to have nearly half a million people using its Gov.uk Verify service for online identity assurance by April 2015 Continue Reading By- Bryan Glick, Editor in chief
 
- 
                E-Zine
                27 Oct 2014
                  Securing critical industrial systemsIn this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading 
- 
                News
                15 Oct 2014
                  Gov.uk Verify identity assurance service ready to go liveGovernment expected to launch first service using digital identity assurance in "next couple of weeks" Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                10 Oct 2014
                  Azure CTO Mark Russinovich's top ten public cloud security risksMicrosoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading By- Archana Venkatraman, Datacentre Editor
 
- 
                News
                08 Oct 2014
                  Malware being used to steal cash from ATMsCriminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                E-Zine
                29 Sep 2014
                  Hacking IT from the insideIn this week’s Computer Weekly, car giant Daimler talks about its IT security strategy and the benefits of having its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the latest best practice. Our new buyer’s guide looks at virtualisation backup. And our review of Microsoft’s Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now. Continue Reading 
- 
                News
                16 Sep 2014
                  GDS unveils 'Gov.UK Verify' public services identity assurance schemeThe Government Digital Service (GDS) debuts a system to prove users’ identities when using public services online, branded as 'Gov.UK Verify' Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                11 Sep 2014
                  Google denies breach after hackers leak millions of user loginsGoogle denies claims cyber criminals stole users' data and downplays the threat after a hacker purportedly leaked 4.9 million Gmail logins Continue Reading 
- 
                News
                05 Sep 2014
                  Barclays bank launches biometric authenticationBarclays bank plans to launch biometric readers that read users' finger veins to authenticate customers Continue Reading By- Clare McDonald, Business Editor
 
- 
                News
                21 Aug 2014
                  Load balancing supports Kent County Council's VDI projectKent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                18 Aug 2014
                  What ingredients go into the successful app store?An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading By- Bernt Ostergaard , Quocirca
 
- 
                News
                01 Aug 2014
                  Fingerprint scanners most popular alternative to banking passwordsFingerprint scanning technology is the most favoured biometric security alternative to passwords for UK bank customers Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                31 Jul 2014
                  Paddy Power hit by data breach in 2010Gambling firm Paddy Power owns up to 2010 data breach after recovering a compromised dataset in Canada Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 Jul 2014
                  Tackle IAM with a risk-based approach, says KPMGA risk-based approach is the best way to tackle identity and access management, says KPMG Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                09 Jul 2014
                  Why using voice biometrics is a good ideaBanks and other organisations are turning to voice biometrics, but why do they believe the technology is good idea? Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                04 Jul 2014
                  Barclays passes government’s ‘internet-born threat’ testBarclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading 
- 
                News
                01 Jul 2014
                  Most people keen to share biometric data for smoother travelA study has revealed that 89% of citizens agree with the use of biometric identification to aid travel Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                24 Jun 2014
                  Benefits of accessing data outweigh privacy risks for chronically illOver half of UK patients with chronic health conditions want access to their medical records and believe the benefits outweigh privacy risks Continue Reading 
- 
                News
                17 Apr 2014
                  Datacentre lessons learnt from Heartbleed bugThe Heartbleed bug, an OpenSSL flaw affecting millions of websites, has some lessons for datacentre providers and operators Continue Reading By- Archana Venkatraman, Datacentre Editor
 
- 
                News
                08 Apr 2014
                  Law Society advises legal industry's IT teams over cloudThe Law Society has published best-practice advice for legal firms' IT teams that are considering using cloud computing, following increased use of the cloud to store data Continue Reading 
- 
                News
                04 Apr 2014
                  Cabinet Office vetoed Home Office plans for 'critical' e-Borders replacementHome Office plans for IT systems to replace ageing border security systems that contain “critical vulnerabilities” were vetoed by the Cabinet Office Continue Reading By- Bryan Glick, Editor in chief
 
- 
                Feature
                14 Mar 2014
                  Hacktivism: good or evil?IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading By- Dai Davis, Percy Crow Davis & Co
 
- 
                News
                12 Mar 2014
                  Government finally ends e-Borders programmeThe government has formally ended the troubled e-Borders programme, with its intended functions merged into a new project Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                27 Feb 2014
                  Microsoft takes aim at passwordsMicrosoft says it is determined to solve the problem of ineffective authentication that relies on usernames and passwords Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                05 Feb 2014
                  Bank of England publishes Waking Shark II cyber security exercise resultsBank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                News
                15 Jan 2014
                  The IT risks facing Universal CreditDespite Iain Duncan Smith's robust defence of his flagship welfare reform policy, Universal Credit, evidence to the contrary continues to mount Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                10 Jan 2014
                  Security considerations for UK enterprisesThis Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading - 
                News
                12 Nov 2013
                  Global profiles of the fraudsterComputers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading - 
                News
                30 Oct 2013
                  Identity assurance system moves into beta test phaseThe Government Digital Service has started testing of a key system to support plans for citizens to securely prove their identity when accessing online public services Continue Reading By- Bryan Glick, Editor in chief
 
- 
                News
                17 Oct 2013
                  Government overhauls security classification to fit digital ageIn its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age. Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                26 Sep 2013
                  Small businesses must encrypt customer data, says ICOThe Information Commissioner’s Office (ICO) urges small businesses to encrypt customer data after a sole trader was fined for failing to do so Continue Reading 
- 
                News
                05 Sep 2013
                  Windows 2012 Server Network SecurityThis book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading - 
                News
                05 Sep 2013
                  Windows Server 2012 Security from End to Edge and BeyondThis extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading - 
                News
                05 Sep 2013
                  Printing: a false sense of security?Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading - 
                News
                20 Aug 2013
                  Targeted attacks and how to defend against themAnalysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading - 
                E-Zine
                30 Jul 2013
                  The threat within – balancing security and employee privacyIn this week’s Computer Weekly, as more data breaches come from inside an organisation, we examine how to get the right balance between information security and employees’ rights to privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. Our buyer’s guide to data management explains how one major utility firm improved information sharing. And we look at how mobile technology and wireless networking is helping improve patient care in the NHS. Read the issue now. Continue Reading 
- 
                News
                22 Jul 2013
                  Insider threat: Balancing security with privacyHow can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                19 Jul 2013
                  IT security case studiesFour critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading - 
                News
                18 Jul 2013
                  Needle in a Datastack: The rise of big security dataThis research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading - 
                News
                17 Jul 2013
                  2013 Cost of Data Breach Study: UKThe cost of data breaches has risen for UK organisations over the past year, the Ponemon Institute reveals. Continue Reading - 
                News
                17 Jul 2013
                  Security Think Tank Download: Bring your own deviceDownloadable guide. How to make your company secure when you introduce BYOD. Continue Reading - 
                News
                17 Jul 2013
                  IT Security Case StudiesWarwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading - 
                News
                11 Jul 2013
                  Protecting against modern password crackingThis article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading - 
                News
                24 Jun 2013
                  Identity management key to browser-based IT strategyA cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                Feature
                10 Jun 2013
                  Manage identity and access to improve business processesStreamlining identity and access management is essential to exploiting your organisation’s assets and employees’ productivity. Continue Reading By- Andras Cser
 
- 
                News
                10 Jun 2013
                  2013 Cost of Data Breach Study: UKThe cost of data breaches has risen for UK organisations over the past year, but companies that appoint chief information security officers with enterprise-wide responsibilities can reduce their costs, this report from the Ponemon Institute reveals Continue Reading - 
                News
                01 May 2013
                  CW buyer's guide: context-aware securityThis 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading - 
                News
                01 May 2013
                  CW Special Report on CSCThis 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading 

 
		