Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
Top 10 cyber security stories of 2019
Sponsored by: TechTarget ComputerWeekly.com2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
-
Storage Capacity 101 to Post-Grad in a Flash
Sponsored by: TechTarget ComputerWeekly.comIn this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
-
Digital Experience Platforms Trends
Sponsored by: Progress Software CorporationThis e-book explores how organizations are leveraging digital experience platforms (DXPs) to drive digital transformation and customer experience. It covers the benefits of DXPs, such as increased agility and operational efficiencies, as well as the top technologies used to optimize digital experiences. Read the full e-book to learn more.
-
UK IT Priorities 2019
Sponsored by: TechTarget ComputerWeekly.comThe results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
-
UK IT Priorities 2019
Sponsored by: TechTarget ComputerWeekly.comThe results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
-
Royal Holloway: Information security of the 2016 Philippine automated elections
Sponsored by: TechTarget ComputerWeekly.comWe analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
A Security Assessment of Android Full-disk Encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
-
Bluetooth Low Energy: The IoT battle
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.