You've requested...

Share this with your colleagues:

Download this next:

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. 

Also in this issue:

Burden of data protection is on firms and governments, conference told

A senior executive at Singapore’s Cyber Security Agency has stressed the role of corporate data governance and government regulations in raising the bar on cyber security.

Bug hunters

Trend Micro’s Zero Day Initiative is a leading bug bounty program that shares software vulnerabilities with suppliers including Microsoft and Adobe.

Global IoT security standard an elusive goal

Despite the lack of a global internet of things security standard, existing security frameworks are on the same page in areas such as device upgradability and data stewardship.

These are also closely related to: "Cutting through the blockchain hype"

  • IT outlook in 2019

    Hardly a day went by in 2018 without hearing about yet another organisation falling prey to a cyber attack, or adopting artificial intelligence and cloud computing to improve business outcomes. While these trends are likely to continue into the new year, you can expect more developments in areas like blockchain and 5G networks that will shape the enterprise technology landscape.

    In this e-guide, find out what dominated the headlines in 2018, as well as key areas worth looking out for over the next 12 months.

  • CW ANZ, November 2018: Exploring blockchain

    Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.

    Also in this issue:

    Australia’s healthcare sector reports most data breaches for second time

    In the first full quarter since Australia’s mandatory breach disclosure scheme came into effect, the highest number of data breaches came from healthcare providers, amid controversy over the national health record system.

    Australian government digital agency trials Microsoft secure cloud service

    Digital Transformation Agency employees will have access to Exchange Online, SharePoint, Skype for Business and several Azure services via Microsoft Office 365.

    New Zealand ready to conduct national cyber security exercise after year delay

    The country has begun testing the cyber resilience of its critical national infrastructure this month, bringing together multiple agencies to protect assets of national significance.

Find more content like what you just read:

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

    Download

  • UK IT Priorities 2019

    The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.

    Download

  • How to securely migrate from x86 to LinuxONE

    LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It has been designed to run more transactions faster and with more security and reliability specifically for the open community. In this white paper, learn about the process of migrating from x86 to LinuxONE.

    Download

  • CW Issue: Innovation in the digital era

    This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.

    Download

  • CW ANZ: Report data break-ins - it's the law

    Cyber security is an increasingly global endeavour with threat actors who know no boundaries unleashing attacks from nearly anywhere in the world. In this month's issue of CW ANZ, we look at how Australia's mandatory data breach notification law underscores recent efforts to lift its cyber security game.

    Download

  • Secure Voting

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

    Download

  • Cyber security challenge grows in Europe

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

    Download

  • Cyber Threats: A perfect storm about to hit Europe?

    As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

    Download

  • Computer Weekly – 18 June 2019: Applying AI to road safety

    In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.

    Download

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

    Download

  • 10 tactics for fending off advanced cyber threats

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

    Download

  • Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules

    In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.

    Download

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

    Download

  • Data Breaches in Europe

    The personal data of millions of Europeans have been compromised with 89% of the breaches the fault of corporations, according to this investigation by the Central European University.

    Download

  • CW Middle East ezine July 2018

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

    Download

  • CW ANZ: On cyber alert

    In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.

    Download

  • Reduce network risks with 5 mobile and IoT security tips

    In this white paper, learn the five steps you need to take to mitigate the risk of mobile and IoT-enabled data breaches.

    Download

  • CW ASEAN: How managed security services help to reduce cyber risk

    In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.

    Download

  • Managing data breaches

    In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.

    Download

  • CW ASEAN: Be alert to threats

    With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.

    Download

  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to Threat Management

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

    Download

  • The adoption of cloud-based services

    Analysts Bob Tarzey and Bernt Østergaard look at the issues around the adoption of cloud-based services, security technology that is being deployed by enthusiasts and looks at the reasons why the avoiders are holding back.

    Download

  • CW+: Quocirca report: You sent what ?

    Electronically stored information is a key asset for any organisation, but it is often insufficiently cared for—as the numerous high profile data breaches reported in recent years demonstrate.

    Download

  • How one company mitigated phishing and fraud attacks against senior staff

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.

    Download

  • Global Information Security Workforce Study

    There will be an estimated shortall of 1.5 million in the global information security workforce within five years, this study from (ISC)² predicts.

    Download

  • CW ASEAN: Time to dial up defences

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

    Download

  • Sharing knowledge to tackle online banking fraud

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

    Download

  • CW ANZ: Cyber security plan bears fruit

    Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape.

    Download

  • CW buyer's guide: context-aware security

    This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.

    Download

  • CW ANZ: Trend Watch – Security

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

    Download

  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

    Download

  • CEB IT Budget Benchmark 2015 to 2016

    Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.

    Download

  • Threat intelligence: What to look for in a solution

    This white paper will arm you with a set of criteria to gauge threat intelligence by its source, intended audience, and use cases to help narrow down the field to a few basic types. Read on to learn more.

    Download

  • Cyber security in the Middle East

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

    Download

  • Getting a handle on endpoint management

    In this e-guide, read about the need for unified endpoint management, what an endpoint management strategy should cover and how endpoint security issues can be tackled.

    Download

  • Computer Weekly – Digital giving – transforming Save the Children with technology

    In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.

    Download

  • What can intent-based networking do for you?

    In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now.

    Download

  • The Global Risks Report 2016

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

    Download