EGUIDE:
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
EGUIDE:
In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.
EZINE:
In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
EGUIDE:
With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
ESSENTIAL GUIDE:
In this guide find out about the emerging market the Internet of Things (IoT). Find out advice, read case studies and learn how to manage the massive growth in connected devices and objects.
EZINE:
In this week's Computer Weekly, with internet giants like Google, Apple and Facebook offering banking services, Santander is leading the fightback by launching a cloud storage service; but can it win? Our latest buyer's guide looks at cloud-optimised IT. And we examine how the economic trends will affect CIOs this year. Read the issue now.
EGUIDE:
In this e-guide: The Post Office does not have enough money to pay compensation to the subpostmasters it wrongfully prosecuted. The government is stepping in to use more taxpayers' money to compensate subpostmasters who were ruined by the Post Office Horizon scandal.
WHITE PAPER:
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.