You've requested...

Download this next:

Top 10 ASEAN IT stories of 2017

There has never been a better time to live and work in ASEAN, a fast-growing economic powerhouse with a young, tech-savvy population that lives and breathes technology.

Led by governments and a handful of technology suppliers, countries across the region have been forerunners in driving digital transformation through smart city initiatives and industry transformation roadmaps. The goal is to lift living standards, create well-paid jobs and position their countries as leaders in the digital age.

In this review of the top 10 Computer Weekly articles focused on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.

These are also closely related to: "Top security challenges for governments"

  • CW Benelux August 2017

    If the latest IoT Tech Day in Utrecht, Netherlands, is anything to go by, the IoT is moving from the enthusiast’s bedroom to the commercial setting.

    Computer Weekly attended the annual event and discovered how the internet of things could change the world. Google even used an April Fool’s joke to promote IoT just before the event, when it announced how it was going to make the Netherlands a dry and sunny place through connected windmills. A joke maybe, which you can read about in this issue,  but who would have thought driverless cars, flying taxis and robots giving financial advice would be more than science fiction.

    In this issue, read about the application of the IoT at railways in the Netherlands, which is reducing congestion on pedestrian routes caused by people making their daily commute. The move away from paper tickets to plastic chipcards has opened up possibilities for tracking people’s movements. The proliferation of smartphones, lower-cost sensor technology and smart application of the IoT have made it more feasible.

    If the Netherlands is going to continue to remain a tech leader, it needs to attract the best and brightest in the industry. The country has a shortage of tech talent. Recent research by Intelligence Group shows that for every 26 vacancies, just one junior IT professional is available. And for mid-career IT roles, there is only one professional available for every 16 vacancies. Unsurprisingly, it is programmers and data analysts that are in highest demand in the Netherlands. Trouble is, it is the same in London and Silicon Valley, so there is strong competition for their services.

  • In 2017, the insider threat epidemic begins

    Insider threats begin with trusted employees whose frustration, resentment, apathy, lack of cyber security training and awareness, or external motivations radicalise them to unintentionally or willfully inflict harm on the organisation by compromising systems, assisting external cyber threat actors in multi-vector information warfare, or exfiltrating treasure troves of valuable PII, PHI, and other sensitive data.

    Perimeter-based defences cannot stop the threats that are already inside the network. Bleeding-edge defence-grade insider threat solutions, such as user and entity behavioral analytics (UEBA), identity and access management (IAM), virtualisation and user activity monitoring (UAM) are necessary to detect, deter and mitigate the mounting insider threat epidemic against critical infrastructure.

Find more content like what you just read:

  • Next generation network security

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

    Download

  • Top 10 cyber crime stories of 2019

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

    Download

  • CW Nordics ezine February 2018

    In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.

    Download

  • CW Europe: December 2016 - February 2017

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

    Download

  • Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface

    Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.

    Download

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

    Download

  • CW ASEAN: Time to dial up defences

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

    Download

  • Uber and Volkswagen: Handling ethics in IT

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

    Download

  • SME cyber security is increasingly a business imperative

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

    Download

  • The Top Cyber Security Trends in ASEAN in 2017

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

    Download

  • Global ransomware attack is a security wake-up call

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

    Download

  • Why hyper-converged infrastructure could improve overall IT performance

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

    Download

  • Top 10 Australian IT stories of 2017

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to improve work productivity, upgrade its supercomputing infrastructure, harness the internet of things to improve business operations and realise its space ambitions.

    Download

  • Top 10 ASEAN stories of 2018

    In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.

    Download

  • CW Benelux May 2018

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

    Download

  • Computer Weekly – 9 January 2018: Countdown to GDPR

    In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.

    Download

  • GDPR: Risk, opportunity and what it means for security professionals

    This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.

    Download

  • Data protection: A business imperative

    In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.

    Download

  • How Brexit will affect your security online

    In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.

    Download

  • VMworld 2017 recap: Adapting legacy IT

    In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.

    Download

  • The Ultimate Guide to Ransomware and Cybersecurity Planning

    Read through this comprehensive e-guide for everything you need to know about cybersecurity planning for ransomware: types of attacks, common attack vectors, prevention methods and tools, best practices for recovery, and more.

    Download

  • 30-page e-book: IoT security benchmark report 2023

    81% of security leaders surveyed by Starfleet Research reported that their business was struck by an IoT-focused attack within the past year. So, how can you boost IoT security at your own organization? Find guidance in this 30-page e-book.

    Download

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

    Download

  • World Economic Forum Global Risks Report 2018

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

    Download

  • Political Turmoil Threatens Global IT Services Sector

    In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.

    Download

  • Pros and cons of major CRM providers

    In this issue of Computer Weekly, as the UK votes for a new government, examine the digital policies in the manifestos of the Conservative, Labour and Liberal Democrat parties, and hear what IT trade body TechUK would like to see for the tech sector from the next administration. Read the issue now.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • What's going to impact channel in 2017?

    Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • Strategy & technology trends for ANZ CIOs

    This e-guide highlights strategies to help make emerging technologies such as big data analytics, artificial intelligence and cloud computing work for your business. Plus, get a sneak preview of the tech trends that are likely to dominate 2018.

    Download

  • Computer Weekly – 31 January 2017: Visionary technology transforming healthcare

    In this week's Computer Weekly, find out how a visionary approach to technology is transforming healthcare at London's world-leading Moorfields Eye Hospital. The UK tech sector has set out its priorities for the forthcoming Brexit negotiations – we take a look. And our new buyer's guide examines trends in datacentre management. Read the issue now.

    Download

  • Computer Weekly – 24 October 2017: Where will AI take us?

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

    Download

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

    Download

  • Royal Holloway: Corporate under-reporting of cyber crime

    Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

    Download

  • Computer Weekly – 10 April 2018: Technology is a lifesaver for NHS Blood and Transplant

    In this week's Computer Weekly, we talk to the CDO of the NHS's blood and transplant agency about how digital transformation is proving to be a real lifesaver. Our latest buyer's guide examines the state of public cloud. And we find out how Ireland is gaining a Brexit dividend to boost its tech sector. Read the issue now.

    Download

  • Will mobile networks cope with the end of roaming charges?

    Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.

    Download

  • Computer Weekly – 28 February 2017: Navigating software licences

    In this week's Computer Weekly, after SAP won a court case against a major customer, Diageo, over software charges, we look at what this means for users. We talk to the IT consultancy that recruits only autistic IT professionals. And we look at the CIO's big challenges for the year. Read the issue now..

    Download

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

    Download

  • 2024 security report: Predictions from 3 CISOs

    In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.

    Download

  • CW ANZ, November 2018: Exploring blockchain

    Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.

    Download

  • Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice

    In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.

    Download

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Top 10 Australia IT stories of 2018

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.

    Download

  • Deloitte CIO survey 2016-2017 – UK Edition

    Download Deloitte's 2016-2021 CIO survey to discover how CIOs can deliver value and impact to their organisations.

    Download

  • Computer Weekly – 13 February 2018: On the path to diversity in tech

    In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now.

    Download

  • Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town

    In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.

    Download

  • Focus: Securing the cloud

    While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

    Download