Security Policies Research
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
-
Australia's cybersecurity game plan
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits
Sponsored by: TechTarget ComputerWeekly.comTech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.
-
RSA Conference 2020 guide: Highlighting security's human element
Sponsored by: TechTarget ComputerWeekly.comThe theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
CW Europe - March-May 2020: Experts examine Dutch government's IT problems
Sponsored by: TechTarget ComputerWeekly.comTechnology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.
-
Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.
-
Why zero trust is IT security's best hope
Sponsored by: TechTarget ComputerWeekly.comThis guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
-
CIO Trends #10: Nordics
Sponsored by: TechTarget ComputerWeekly.comSwedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.
-
Dutch organisations demand more from government
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
-
CW Europe December 2019: Deutsche Bank creates innovation division
Sponsored by: TechTarget ComputerWeekly.comGerman investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
-
CW Nordics August 2019: Copenhagen woos tech startups
Sponsored by: TechTarget ComputerWeekly.comCopenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.
-
CW Middle East ezine April 11 2019
Sponsored by: TechTarget ComputerWeekly.comIt's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
-
Top 10 IT security stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThe discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
Infographic: 6 emerging trends in security
Sponsored by: TechTarget ComputerWeekly.comIn this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
-
Data protection: A business imperative
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
-
Infosec culture: A former helicopter pilot's perspective
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
-
CW ASEAN: Time to dial up defences
Sponsored by: TechTarget ComputerWeekly.comIn this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
-
CW Nordics ezine February 2018
Sponsored by: TechTarget ComputerWeekly.comIn the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
-
CW Benelux February 2018
Sponsored by: TechTarget ComputerWeekly.comIn this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
-
Computer Weekly – 30 January 2018: Davos debates global tech risks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
-
CIO Trends #6: Nordics
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
-
CW Europe – December 2017
Sponsored by: TechTarget ComputerWeekly.comIn this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.