Security Think Tank: The phishing forecast for 2024
Computer Weekly » Identity and Access Management Products
by
4d ago
Egress' Jack Chapman and James Dyer explore how phishing attacks are set to grow in their scope and sophistication this year, with generative AI playing a big role  ..read more
Visit website
ICO prompts confusion over police cloud legality
Computer Weekly » Identity and Access Management Products
by
2w ago
The UK data regulator has suggested that, despite major data protection concerns, it is likely to greenlight police cloud deployments because of an information-sharing agreement with the US government  ..read more
Visit website
Top 10 police technology stories of 2023
Computer Weekly » Identity and Access Management Products
by
1M ago
Here are Computer Weekly’s top 10 police technology stories of 2023  ..read more
Visit website
Scotland ‘sleepwalking’ to mass surveillance with DPDI Bill
Computer Weekly » Identity and Access Management Products
by
1M ago
The independent checks and balances over biometrics and biometric-enabled surveillance must be strengthened to prevent Scotland from sliding into a surveillance state along with the rest of the UK  ..read more
Visit website
UK government seeks public views on impacts of AI-generated porn
Computer Weekly » Identity and Access Management Products
by
1M ago
The government’s Pornography Review will look in part at the use of AI throughout the industry to generate sexually explicit content without people’s consent  ..read more
Visit website
Security Think Tank: Anytime, anywhere access is achievable
Computer Weekly » Identity and Access Management Products
by
2M ago
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward?  ..read more
Visit website
The Security Interviews: Mark McClain, SailPoint Technologies
Computer Weekly » Identity and Access Management Products
by
2M ago
SailPoint founder and CEO Mark McClain reflects on how the concept of identity has evolved over the past 20 years, and points to rapid evolution still to come  ..read more
Visit website
Human augmentation tech requires dual use oversight
Computer Weekly » Identity and Access Management Products
by
2M ago
Researchers investigating human augmentation technologies must acknowledge the potential military applications of their work, and military bodies cannot be allowed to dismiss ethical concerns in their pursuit of national security interests, says NGO Drone Wars UK  ..read more
Visit website
AMD Instinct MI300 AI accelerator takes aim at Nvidia GPUs
Computer Weekly » Identity and Access Management Products
by
2M ago
Data center-grade GPUs and accelerators for enterprise customers and cloud vendors are the new battleground for AI hardware. AMD ..read more
Visit website
5 phases to build a network automation architecture
Computer Weekly » Identity and Access Management Products
by
2M ago
The implementation of a network automation architecture involves several elements, including a core orchestration engine ..read more
Visit website

Follow Computer Weekly » Identity and Access Management Products on FeedSpot

Continue with Google
Continue with Apple
OR