ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Time to Adapt: The State of Human Risk Management in 2024

    Sponsored by: CultureAI

    As the threat landscape evolves, companies must adopt a proactive, data-driven approach to human risk management. This white paper explores the limitations of security awareness training and the benefits of leveraging human risk management solutions to strengthen organizational security. Read the full white paper to learn more.

  • CW Buyer's Guide to 5G mobile networking

    Sponsored by: TechTarget ComputerWeekly.com

    5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.

  • Wind River Linux For Medical Devices

    Sponsored by: Wind River

    Open source Linux is cost-effective and customizable for medical device development but presents security and compliance issues. Wind River Linux offers an advanced embedded platform with robust security, compliance support, and lifecycle management, aiding innovation and risk reduction in medical devices. Learn more in the full overview.

  • CW Benelux February 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns

    Sponsored by: HGST

    This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.

  • How do cybercriminals steal credit card information?

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

  • The gender pay gap

    Sponsored by: TechTarget ComputerWeekly.com

    This survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.

  • Why Physician Leadership is Critical in the Supply Chain

    Sponsored by: Advantus

    A physician supply chain leader acts as a medical director, and these roles must have business savvy, as well as embrace teamwork. Read this paper as Dr. Chung, CMO of Advantus, lends his insight into forming physician resource optimization teams, holding cross-disciplinary trainings, and 3 initiatives that increase value for patients.

  • IT Priorities 2020: APAC

    Sponsored by: TechTarget ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • The 2024 State of Software Delivery

    Sponsored by: CircleCI

    This report analyzes nearly 15 million data points to reveal how software teams are becoming more productive and efficient. Learn how leading organizations are leveraging CI/CD to drive innovation, improve quality, and stay competitive. Read the full report to gain actionable insights.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.