EZINE:
It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".
EZINE:
The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
EZINE:
Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
EZINE:
Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
EZINE:
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
EBOOK:
After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
EZINE:
It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
EZINE:
In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.