Top 10 Benelux IT stories of 2018
By: TechTarget ComputerWeekly.com View more from TechTarget ComputerWeekly.com >>
Download this next:
A Computer Weekly buyer's guide to artificial intelligence in IT security
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer’s guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
These are also closely related to: "Top 10 Benelux IT stories of 2018"
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer’s guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
CW Benelux February 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1000 vulnerabilities.
Although the hacking sabbatical ended over a year ago, Gevers has not ended his mission. He is a sought-after public speaker who shares insights about IT security.
Ethical hackers are not alone in unearthing security flaws. In this issue, also read how journalists have brought security weaknesses in the government to public attention. Journalists recently demonstrated how the email addresses of Dutch politicians are easy to spoof. A heated debate followed about the responsibilities of reporters in revealing security flaws, and the implementation of common security practices on email servers.
It began when Dutch investigative journalists from a website that specialises in financial news stories posted an article on the possibility of spoofing emails sent in the name of Dutch MPs. Reporters discovered the possibility of sending emails that appeared to come from the domain used by the Dutch parliament.
In the wider continent, read how policy-makers in Brussels have approved a new electronic system to store biometric information on all non-EU citizens travelling in and out of the bloc.
Find more content like what you just read:
-
CW Benelux November 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
-
Top 10 enterprise IT in the Benelux region stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
-
CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal
By: TechTarget ComputerWeekly.com
Type: Ezine
There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.
-
CIO Trends #11: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
-
CIO Trends #11: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
-
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
By: TechTarget ComputerWeekly.com
Type: eGuide
Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
-
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
By: TechTarget ComputerWeekly.com
Type: Ezine
Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
-
CIO Trends #10: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
-
CIO Trends #9: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
-
Fraud management: A perennial business issue
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
-
CW Middle East ezine April 11 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
-
Why is there an ethical debate around AI?
By: TechTarget ComputerWeekly.com
Type: Ezine
This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.
-
CW EMEA - September 2023: The value of valuing people
By: TechTarget ComputerWeekly.com
Type: Ezine
In this month's CW EMEA ezine, we look at HR software and strategies that can help combat staff attrition and find out how Finland's and Sweden's plans to join NATO have initiated activity in the Nordic cyber security sector already. Read the issue now.
-
CW EMEA – December 2023: Prepare for cyber war
By: TechTarget ComputerWeekly.com
Type: Ezine
When the war between Hamas and Israel began, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. Read the issue now.
-
CW Nordics May 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
In a country like Sweden which has embraced IT to transform life and work and where concepts like cashless society are welcomed by many, the proliferation of artificial intelligence is inevitable.
-
Top 10 cyber crime stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
-
Multi-pronged approach to cyber security professional development
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
-
CW Europe – December 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
-
Jargon Buster Guide to Post Quantum Cryptography
By: TechTarget ComputerWeekly.com
Type: eGuide
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
-
Data protection: A business imperative
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
-
CW Nordics ezine February 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
-
CW ASEAN: European data law - be aware and prepare
By: TechTarget ComputerWeekly.com
Type: Ezine
Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
Secure remote access: More vital than ever thanks to Covid-19
By: TechTarget ComputerWeekly.com
Type: eGuide
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
-
CW Nordics August 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
-
CW Europe – September-November 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
-
Security analytics: Enabling organisations to get ahead of attackers
By: TechTarget ComputerWeekly.com
Type: eGuide
In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
-
A Computer Weekly buyer's guide to zero-trust security
By: TechTarget ComputerWeekly.com
Type: eGuide
Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
-
CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
By: TechTarget ComputerWeekly.com
Type: Ezine
Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
-
A Computer Weekly buyer's guide to blockchain technology
By: TechTarget ComputerWeekly.com
Type: eGuide
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
-
Top 10 cyber security stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
-
Data protection, a live issue that affects us all
By: TechTarget ComputerWeekly.com
Type: eGuide
Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
-
CIO Trends #9: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
In this issue find out how blockchain is being tried out in Saudi Arabia to enable consumers to use their faces and blockchain-based apps to withdraw money from cash machines, rather than inserting PINs. Also, read how the UAE's Etihad Airways is working to use AI to help it better engage with staff and benefit from their knowledge and ideas.
-
DevSecOps delivers better business
By: TechTarget ComputerWeekly.com
Type: eGuide
Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
-
CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
By: TechTarget ComputerWeekly.com
Type: Ezine
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
-
Getting Cloud Security Right
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
-
Containers: Making security and business sense
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
-
Cyber Security: 2021 Worst in Show
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
-
CIO Trends #10: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
-
Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.
-
CIO Trends #10: Nordics
By: TechTarget ComputerWeekly.com
Type: eGuide
Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.
-
A Computer Weekly buyer's guide to robotic process automation
By: TechTarget ComputerWeekly.com
Type: eGuide
Robotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation
-
Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.
-
Security Think Tank: Biden's Cyber Security Plan
By: TechTarget ComputerWeekly.com
Type: eGuide
As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
A Computer Weekly buyer's guide to perimeterless network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
A Computer Weekly buyer's guide to cyber insurance
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
-
Why zero trust is IT security's best hope
By: TechTarget ComputerWeekly.com
Type: eGuide
This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
-
CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres
By: TechTarget ComputerWeekly.com
Type: Ezine
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
-
A Computer Weekly buyer's guide to secure and agile app development
By: TechTarget ComputerWeekly.com
Type: eGuide
As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding