EZINE:
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
EBOOK:
Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
INFOGRAPHIC:
In this infographic, based on research from Computer Weekly of over 850 European B2B IT buyers, learn the impact of the pandemic on the future of IT projects. In addition, get an overview on the major trends facing the European market in 2022 such as the cloud first trend and the move to automation.
EBOOK:
There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
INFOGRAPHIC:
As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
EGUIDE:
In this guide, learn about basic and advanced techniques administrators can use to reduce the complexity of PowerShell code and simplify scripts.
EZINE:
Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.
WHITE PAPER:
As ransomware wreaks havoc across all industries, it’s important to consider how you can reduce your exposure to ransomware attacks and limit the damage when they do happen. Explore this white paper to learn how you can protect and control these 3 different ransomware attack vectors: remote access, email, and the supply chain.
EBOOK:
The past 12 months saw ransomware attacks hit new levels of sophistication, with cyber criminal gangs turning to increasingly professional-style tactics and targeting more impactful victims – and these trends are highly unlikely to fade as we move further into 2022.