EZINE:
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
EZINE:
The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.
EZINE:
In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
EZINE:
This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.
EZINE:
In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.
DATA SHEET:
Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for 2017.
EGUIDE:
In this infographic, we show the results of our 2020 Media Consumption Survey for the Asia-Pacific region. Find out who is part of the buying team and what do we know about the "final decision maker".
EZINE:
What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.
EGUIDE:
In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out who is part of the buying team and what do we know about the "final decision maker".
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.