ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • SHEDDING LIGHT ON OEM STORAGE SUPPORT

    Sponsored by: Service Express

    If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

  • CIO Trends #7: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.

  • Digital experience focus broadens to encompass employees

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide to employee experience includes a podcast discussion about the evolution of employee experience management. Also, we explore how advanced companies are responding to skills shortages and millennial employee attitudes by listening harder to their workforces.

  • Top 10 datacentre stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The demand from the hyperscale cloud and internet companies for colocation capacity continued to cast a long shadow over the datacentre sector in 2019, and served to ensure a number of the trends that have influenced the news cycle in previous years continued to play out. Here's a look back over Computer Weekly's top 10 datacentre stories of 2019.

  • A Computer Weekly Buyer's Guide to Microsoft Office 365

    Sponsored by: TechTarget ComputerWeekly.com

    Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.

  • The B2B Technology Buyer’s Journey for Joint Solutions Insights for Partner Marketers

    Sponsored by: TechTarget

    77% of B2B technology professionals surveyed by Enterprise Strategy Group (ESG) plan to increase their budget for joint partner solutions in the next 12 to 24 months. To discover why this is the case, and to unlock insights about the buying journey, tap into this TechTarget e-book.

  • Detect, Investigate, and Respond: Reduce Financial Crime and Fraud in Financial Services

    Sponsored by: Splunk

    The Splunk Fraud and Crime Outcome Brief details how financial institutions can leverage Splunk's advanced data aggregation and machine learning capabilities to detect, investigate, and respond to financial fraud and crime.

  • Liberate Data and Modernize your Network for AI and LLM with Aviatrix

    Sponsored by: Aviatrix Systems

    Aviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.

  • Zscaler ThreatLabz 2024 Phishing Report

    Sponsored by: Zscaler

    Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.

  • Zscaler ThreatLabz 2024 Phishing Report

    Sponsored by: Zscaler

    The Zscaler ThreatLabz 2024 Phishing Report examines the evolving phishing landscape, including the impact of AI, top targeted industries, and emerging tactics like vishing and browser-in-the-browser attacks. Learn how to enhance your organization's phishing defenses by reading the full report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.