EZINE:
In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
EZINE:
The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.
EZINE:
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
EZINE:
Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
VIDEO:
Forward-thinking executives are harnessing data-driven innovation to improve performance, and in this Data Story IBM looks at research that shows how leading companies are using data as an asset and using intelligent automation to as a means to growth and operational advantage.
EGUIDE:
In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.
EZINE:
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
EZINE:
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.