You've requested...

Advance AI Data Security and Collaboration in Healthcare

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly – 25 July 2023: Getting comfortable with data

In this week’s Computer Weekly, we talk to “Data Bob” – the head of IT at furniture retailer DFS – about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the widespread breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.

These are also closely related to: "Advance AI Data Security and Collaboration in Healthcare"

  • CW ANZ, November 2018: Exploring blockchain

    Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.

    Also in this issue:

    Australia’s healthcare sector reports most data breaches for second time

    In the first full quarter since Australia’s mandatory breach disclosure scheme came into effect, the highest number of data breaches came from healthcare providers, amid controversy over the national health record system.

    Australian government digital agency trials Microsoft secure cloud service

    Digital Transformation Agency employees will have access to Exchange Online, SharePoint, Skype for Business and several Azure services via Microsoft Office 365.

    New Zealand ready to conduct national cyber security exercise after year delay

    The country has begun testing the cyber resilience of its critical national infrastructure this month, bringing together multiple agencies to protect assets of national significance.

  • Examining the Healthcare Industry's Potential for Confidential Computing

    Healthcare data analytics requires some of the highest data privacy and protection measures across the industry, making implementing privacy-preserving technologies a top priority.

    Doing so requires health systems to investigate, assess, and potentially deploy a variety of solutions.

    Cloud adoption has become increasingly popular for securing healthcare data, but there are key technologies used within the context of cloud computing that can enhance data protection.

Find more content like what you just read:

  • CW Middle East Oct to Dec 2016

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

    Download

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.

    Download

  • Demystifying risk management

    Risk management refers to the practices and systems an organization employs to identify, monitor and remediate this risk. To shed light on risk management TechTarget has provided this article-guide, which will take you through the ins and out of risk management, as well as its importance for modern IT. Read on to learn more.

    Download

  • Computer Weekly – 7 June 2022: Using technology to reinvent shopping

    In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.

    Download

  • Bring Differentiated Therapeutics to Market Faster

    Leading life sciences organizations like Moderna, AstraZeneca, and Thermo Fisher Scientific leverage AWS to remove the undifferentiated heavy lifting to focus more time and resources on bringing new and differentiated treatments to market. Read this eBook to learn how you can do the same.

    Download

  • The Cycle of Healthcare Data: Creation, Gathering, and Handling

    Understanding data generation, collection, and processing can guide stakeholders looking to tackle various data analytics projects in healthcare.

    Download

  • Computer Weekly - 2 February 2021: Business intelligence helps ambulance service's pandemic response

    In this week's Computer Weekly, we find out how one ambulance service is using business intelligence tools to join up datasets to improve its response to the Covid-19 pandemic. Our latest buyer's guide examines video conferencing and collaboration. And we look at the benefits of real-time streaming data analytics. Read the issue now.

    Download

  • CW Nordics November 2016

    This quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.

    Download

  • Computer Weekly – 18 July 2023: Soaring ahead with data at Rolls-Royce

    In this week's Computer Weekly, we find out how aerospace giant Rolls-Royce uses data to improve its competitive advantage. We examine the benefits and best practices in software-defined storage. And we analyse calls for a review of laws around the use of computer evidence prompted by the Post Office IT scandal. Read the issue now.

    Download

  • CW EMEA: Investing in the future

    There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.

    Download

  • Innovation Awards APAC 2023 - Healthcare: Zuellig Pharma

    Zuellig Pharma saw the lack of advanced analytics and trusted data platforms in the healthcare sector and built an offering to plug the gaps and help pharmaceutical companies enhance customer engagement. The platform has already helped one organisation better understand user behaviour and gain customer loyalty.

    Download

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

    Download

  • Jargon Buster Guide to Post Quantum Cryptography

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

    Download

  • Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks

    In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.

    Download

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • CW Europe – December 2017

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

    Download

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

    Download

  • Security Incidents: How Can You Minimize Their Impact?

    Inside ARG’s “Cybersecurity Market Insights & Decision Guide,” you can discover three goals on which to focus in order to minimize the impact of a cybersecurity incident.

    Download

  • Cybersecurity Market Insights & Decision Guide

    Done correctly, cybersecurity goes beyond tools and applications to encompass how you deploy and configure technology. With this guide, learn how to protect your organization and prepare for an audit.

    Download

  • Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography

    In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

    Download

  • Computer Weekly - 26 April 2022: The latest salary trends for IT professionals

    In this week's Computer Weekly, the results of our annual salary survey show pay returning to pre-pandemic levels and work-life balance a growing consideration. As sustainability becomes a critical issue, we look at how datacentres can meet emissions targets. And we find out how IT leaders can help protect children online. Read the issue now.

    Download

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

    Download

  • Security and efficiency with entry-level hardware security modules (HSMs)

    Security is often constrained by limited resources, but with entry level hardware security modules (HSMs), tailored to function seamlessly within these limitations, security doesn’t have to come at the expense of efficiency. Unlock Utimaco’s catalogue of offerings and find the HSM that’s right for your organization.

    Download

  • Generative AI

    While the transformative potential of Generative AI technology is evident, businesses must exercise caution and prioritize human leadership when integrating Generative AI into their operations. Read on to learn why it’s crucial to harness AI’s potential responsibly and sustainably and how your organization can accomplish it.

    Download

  • 8-page paper: Healthcare cybersecurity insights

    To deepen your understanding of the state of cybersecurity in the healthcare industry, and to learn about 3 major security risks, download this 8-page white paper.

    Download

  • Supporting AI workloads from edge to data center to cloud

    To answer your call for powerful servers that can meet your AI requirements, Hewlett Packard Enterprise and NVIDIA® leverage industry-leading server innovation and world-leading AI expertise to deliver HPE ProLiant Gen11 servers

    Download

  • How to get the best value from Office 365

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

    Download

  • Securing your data and digital identities

    With digital adoption at an all-time high, more data and digital identities are being created than ever before. If not secured, these present a serious risk to the future of your business. Download this product overview to learn how Utimaco’s products can help better secure your organization against growing threats.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • AI proves value in HR, but handle with care

    In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.

    Download

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

    Download

  • IT investments: 1,500 organizations’ obstacles & experiences

    To understand the top obstacles to maximizing the value of your organization’s IT investments, review this 19-page report, which is informed by the survey results of 1,500 ARG clients.

    Download

  • Generative AI: How can you leverage digital humans?

    AI entities are now capable of learning from data, analyzing intricate patterns, and refining their performance over time. Business leaders must stay updated on developments, evolving applications, and user interest to exploit this dynamic landscape and harness the transformative potential of generative AI and digital humans. Read on to learn more.

    Download

  • Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic

    In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.

    Download

  • CW Europe - March-May 2020: Experts examine Dutch government’s IT problems

    Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.

    Download

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • Covid-19: Three steps to remote working effectiveness

    Staff are going to have to work from home, if they can, for the foreseeable future. We look at steps to ensure they remain fit and productive

    Download

  • 6 essential steps to building a production-ready AI/ML environment

    Download this e-book to learn the 6 essential steps to building a production-ready AI/ML environment.

    Download

  • Red Hat OpenShift AI: Customer success stories

    Artificial intelligence and machine learning (AI/ML) technologies employ data to deliver business insights, automate tasks, and advance system capabilities. This e-book shows how organizations across industries are using Red Hat technologies to build AI/ML solutions that deliver real business value.

    Download

  • Computer Weekly – 4 July 2023: How data is beating heart disease

    In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.

    Download

  • CW ASEAN – December 2018: How to make the right cloud infrastructure choices

    In this month's edition of CW ASEAN, we take a look at the considerations when choosing infrastructure as a service, and what needs to be in place for enterprises to get the most out of the cloud computing technology

    Download

  • Handling the healthcare industry's black box AI discussion

    How concerned should healthcare stakeholders be about the complexity and lack of transparency in black box artificial intelligence tools?

    Download

  • Computer Weekly - 15 February 2022: On a mission to track space junk

    In this week's Computer Weekly, we talk to the space experts tracking orbital debris using graph database technology. We meet the startups taking very different approaches in trying to develop commercial quantum computers. And we ask why it's so difficult to build a data science team and how to overcome the challenges. Read the issue now.

    Download

  • Customer experience insights guide

    According to a recent study, every year $98 billion is lost by companies failing to provide “simple” experiences that customers want. This report provides a complete breakdown of the current state of customer experience, looking at the key trends defining the modern customer’s demands. Read on to learn more.

    Download

  • Computer Weekly – 27 February 2018: How IT is taking UPS to new heights

    In this week's Computer Weekly, we talk to UPS CIO Juan Perez to find out how making his IT department "business intimate" is driving innovation. We look at how cloud management platforms can help ease the adoption of multiple public cloud services. And we examine how UK local councils are struggling to deal with cyber attacks. Read the issue now.

    Download

  • Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?

    In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

    Download