ComputerWeekly.com Research Library

Powered by Bitpipe.com

Computer Crimes Research

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Sponsored by: ComputerWeekly.com

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • CW Middle East ezine April 11 2019

    Sponsored by: ComputerWeekly.com

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • CW Benelux ezine February 2019

    Sponsored by: ComputerWeekly.com

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • CW Europe – December 2018

    Sponsored by: ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • CW Nordics ezine November 2018

    Sponsored by: ComputerWeekly.com

    Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.

  • CW Benelux ezine August 2018

    Sponsored by: ComputerWeekly.com

    It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".

  • Computer Weekly – 24 October 2017: Where will AI take us?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

  • CW Benelux August 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • CW Middle East July to Sept 2017

    Sponsored by: ComputerWeekly.com

    In this issue of CW Middle East, we find out why the Gulf region must do more to attract women into IT if the region’s countries are to diversify.

  • Computer Weekly: Counting the Real Cost of Financial Cyber Crime

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • CW ANZ November 2016

    Sponsored by: SearchSecurity.com

    With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Cybercrime and warfare: All that matters

    Sponsored by: ComputerWeekly.com

    Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.

  • E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime

    Sponsored by: SearchSecurity.com

    As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.

  • 2008 Verizon Business Data Breach Investigations Report

    Sponsored by: Verizon Business

    Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.

  • The Cybercrime Arms Race

    Sponsored by: Kaspersky Lab

    Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

  • Ten Ways Hackers Breach Security

    Sponsored by: Global Knowledge

    Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.