Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Time to Adapt: The State of Human Risk Management in 2024
Sponsored by: CultureAIAs the threat landscape evolves, companies must adopt a proactive, data-driven approach to human risk management. This white paper explores the limitations of security awareness training and the benefits of leveraging human risk management solutions to strengthen organizational security. Read the full white paper to learn more.
-
CW Buyer's Guide to 5G mobile networking
Sponsored by: TechTarget ComputerWeekly.com5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.
-
Wind River Linux For Medical Devices
Sponsored by: Wind RiverOpen source Linux is cost-effective and customizable for medical device development but presents security and compliance issues. Wind River Linux offers an advanced embedded platform with robust security, compliance support, and lifecycle management, aiding innovation and risk reduction in medical devices. Learn more in the full overview.
-
CW Benelux February 2018
Sponsored by: TechTarget ComputerWeekly.comIn this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
-
Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns
Sponsored by: HGSTThis expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.
-
How do cybercriminals steal credit card information?
Sponsored by: TechTarget ComputerWeekly.comCybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
The gender pay gap
Sponsored by: TechTarget ComputerWeekly.comThis survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.
-
Why Physician Leadership is Critical in the Supply Chain
Sponsored by: AdvantusA physician supply chain leader acts as a medical director, and these roles must have business savvy, as well as embrace teamwork. Read this paper as Dr. Chung, CMO of Advantus, lends his insight into forming physician resource optimization teams, holding cross-disciplinary trainings, and 3 initiatives that increase value for patients.
-
IT Priorities 2020: APAC
Sponsored by: TechTarget ComputerWeekly.comThe Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.
-
The 2024 State of Software Delivery
Sponsored by: CircleCIThis report analyzes nearly 15 million data points to reveal how software teams are becoming more productive and efficient. Learn how leading organizations are leveraging CI/CD to drive innovation, improve quality, and stay competitive. Read the full report to gain actionable insights.