EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
EGUIDE:
In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.
EZINE:
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
EZINE:
The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.
BOOK:
Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.
EZINE:
In this week's Computer Weekly, we reveal our annual UKtech50 list of the most influential people in UK IT. We talk to this year's winner, HM Revenue & Customs CIO Jacky Wright about the challenges of government IT during Brexit. And we also examine the issues around upgrading SAP's ERP system to S/4 Hana. Read the issue now.
EBOOK:
In this infographic, we take a look at the impact of the pandemic on IT purchasing in the UKI region and analyse the best marketing and sales approaches for prospect outreach on the new 'digital' normal.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.