Identity Management (Security) Reports

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

CW Nordics May 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
Posted: 08 Feb 2021 | Published: 25 May 2017

TechTarget ComputerWeekly.com

Executive Interview: Unleashing blockchain's potential
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.
Posted: 16 Feb 2024 | Published: 20 Feb 2024

TechTarget ComputerWeekly.com

Why IAM policies are crucial post pandemic
sponsored by Beta Systems
EGUIDE: Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management (IAM). Find out why IAM policies are crucial in the new normal.
Posted: 02 Apr 2021 | Published: 01 Apr 2021

Beta Systems

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016

Unisys

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

From IoT to IDoT: Securing the Identity of Things
sponsored by TechTarget Security
EZINE: With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.
Posted: 03 Oct 2016 | Published: 03 Oct 2016

TechTarget Security

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

How IAM has Evolved on the Cloud: The Good and the Bad
sponsored by IBM
EGUIDE: Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.
Posted: 15 Feb 2017 | Published: 14 Feb 2017

IBM