You've requested...

Share this with your colleagues:

Download this next:

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. 

Also in this issue:

Burden of data protection is on firms and governments, conference told

A senior executive at Singapore’s Cyber Security Agency has stressed the role of corporate data governance and government regulations in raising the bar on cyber security.

Bug hunters

Trend Micro’s Zero Day Initiative is a leading bug bounty program that shares software vulnerabilities with suppliers including Microsoft and Adobe.

Global IoT security standard an elusive goal

Despite the lack of a global internet of things security standard, existing security frameworks are on the same page in areas such as device upgradability and data stewardship.

These are also closely related to: "Cutting through the blockchain hype"

  • IT outlook in 2019

    Hardly a day went by in 2018 without hearing about yet another organisation falling prey to a cyber attack, or adopting artificial intelligence and cloud computing to improve business outcomes. While these trends are likely to continue into the new year, you can expect more developments in areas like blockchain and 5G networks that will shape the enterprise technology landscape.

    In this e-guide, find out what dominated the headlines in 2018, as well as key areas worth looking out for over the next 12 months.

  • CW ANZ, November 2018: Exploring blockchain

    Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.

    Also in this issue:

    Australia’s healthcare sector reports most data breaches for second time

    In the first full quarter since Australia’s mandatory breach disclosure scheme came into effect, the highest number of data breaches came from healthcare providers, amid controversy over the national health record system.

    Australian government digital agency trials Microsoft secure cloud service

    Digital Transformation Agency employees will have access to Exchange Online, SharePoint, Skype for Business and several Azure services via Microsoft Office 365.

    New Zealand ready to conduct national cyber security exercise after year delay

    The country has begun testing the cyber resilience of its critical national infrastructure this month, bringing together multiple agencies to protect assets of national significance.

Find more content like what you just read:

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

    Download

  • CW Europe - December 2020-February 2021: Tour de France fans get a virtual experience

    The organisers of this year's Tour de France worked with technology services company NTT in partnership with Amaury Sport Organisation to provide what they described as an "enhanced experience" for race fans who could not be at the roadside because of Covid restrictions.

    Download

  • UK IT Priorities 2019

    The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.

    Download

  • Computer Weekly – 21 January 2020: How to avoid becoming the next Travelex

    In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.

    Download

  • CW Issue: Innovation in the digital era

    This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.

    Download

  • Cyber security challenge grows in Europe

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

    Download

  • CW ANZ: Report data break-ins - it's the law

    Cyber security is an increasingly global endeavour with threat actors who know no boundaries unleashing attacks from nearly anywhere in the world. In this month's issue of CW ANZ, we look at how Australia's mandatory data breach notification law underscores recent efforts to lift its cyber security game.

    Download

  • Decentralising datacentres: The new challenges of security at the edge

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

    Download

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

    Download

  • Computer Weekly – 18 June 2019: Applying AI to road safety

    In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.

    Download

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

    Download

  • 10 tactics for fending off advanced cyber threats

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

    Download

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

    Download

  • CW Middle East ezine July 2018

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

    Download

  • Data Breaches in Europe

    The personal data of millions of Europeans have been compromised with 89% of the breaches the fault of corporations, according to this investigation by the Central European University.

    Download

  • 2020 Global Threat Intelligence Report

    The NTT 2020 Global Threat Intelligence Report highlights that Manufacturing is the most attacked business vertical in the UK and Ireland. Manufacturing organizations must ensure a constant focus is placed on the maturity of cybersecurity. Download the report to learn more about a new approach to OT security.

    Download

  • Australia's cybersecurity game plan

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

    Download

  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

    Download

  • CW ASEAN: How managed security services help to reduce cyber risk

    In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.

    Download

  • CW ANZ: On cyber alert

    In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.

    Download

  • Top APAC security predictions for 2020

    Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.

    Download

  • CW buyer's guide: context-aware security

    This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.

    Download

  • CW APAC, July 2020: Trend Watch: Security

    In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.

    Download

  • Getting a handle on endpoint management

    In this e-guide, read about the need for unified endpoint management, what an endpoint management strategy should cover and how endpoint security issues can be tackled.

    Download

  • CW ANZ: Fix the weak links

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

    Download

  • Managing data breaches

    In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.

    Download

  • CW ASEAN: Be alert to threats

    With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.

    Download

  • A Computer Weekly buyer's guide to Threat Management

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

    Download

  • A Computer Weekly buyer's guide to Threat Management

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

    Download

  • How one company mitigated phishing and fraud attacks against senior staff

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.

    Download

  • Manchester United praised for swift response to cyber attack

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

    Download

  • Rethinking the Cyber Security of Consumer Internet of Things

    The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.

    Download

  • CW ASEAN: Time to dial up defences

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • IoT Trends & Challenges in ASEAN

    In this e-guide, we put a South-East Asian spin on the global phenomenon that is the Internet of Things (IoT). With billions of internet connected devices expected around the world, enterprises and governments simply can't ignore IoT, its benefits and its risks.

    Download

  • Cyber security in the Middle East

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Top security threats in 2020: Malware, phishing & more

    The X-Force team at IBM releases an annual report, known as the X-Force Threat Intelligence Index, which summarizes the key cybersecurity threats and trends observed over the past year. Read on to unlock the key findings and takeaways from this year’s comprehensive report.

    Download

  • Security analytics: Enabling organisations to get ahead of attackers

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

    Download

  • Security analytics: Enabling organisations to get ahead of attackers

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

    Download

  • Recap: Splunk.conf 18

    Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.

    Download

  • Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders

    In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.

    Download

  • Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders

    In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.

    Download

  • CW ANZ: Cyber security plan bears fruit

    Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape.

    Download

  • Focus: Securing new technology

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

    Download

  • How cloud changes everything, IoT creates risk, and APM saves businesses

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

    Download

  • Comprehensive guide on the basics of cybersecurity

    Whether you've been in IT for a long time or are just starting out, there is an expectation that everyone in IT should have some degree of exposure to InfoSec. Tap into this comprehensive guide on the basics of cybersecurity to help you get started.

    Download