ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • MicroScope – June 2023: Take a balanced approach to security

    Sponsored by: MicroScope

    In this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not

  • The Future of Data Security Posture Management

    Sponsored by: OpenText

    This white paper examines the evolution of data security posture management (DSPM) and how it can help organizations better protect their data. It explores the impact of AI on DSPM and how the platform can enable business growth by providing a robust data security foundation. Read the full white paper to learn more.

  • State of Application Security 2024

    Sponsored by: Cloudflare

    Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.

  • CW APAC: Expert advice on data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on data analytics in the Asia-Pacific region, Computer Weekly looks at how to marry the art and science of analytics, environmental considerations, the risks of sovereign data strategies and what one telco has done to address scalability challenges.

  • A How-To Guide: Increase IT Efficiency & Reduce Cost With Identity Security

    Sponsored by: SailPoint Technologies

    Discover how to streamline identity security and maximize IT efficiency with automation. This how-to guide explores steps to automate user access, reduce costs, and drive business results with unified identity security. Read the full white paper to learn more.

  • The Business Transformation Management Playbook: Combining Business And IT For Successful Transformation

    Sponsored by: SAP

    The business transformation playbook explores a 5-stage methodology for successful business transformation. Discover your current state, analyze dependencies, design your target state, implement changes, and operate your transformed business. Read the full e-book to learn how to drive effective business transformation.

  • Safely innovate at speed with low-code technologies

    Sponsored by: Avanade

    Explore how low-code technologies like Microsoft Power Platform can help business and IT teams innovate quickly while maintaining governance and security. Learn how a Center of Excellence approach can unlock business value. Read the full white paper to discover more.

  • Computer Weekly: The Most Influential People in UK IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 7th annual UKtech50 – our list of the 50 most influential people in UK IT. And we talk to this year's winner, ARM CEO Simon Segars, about the prospects for the UK tech sector after the uncertainty caused by the Brexit referendum vote. Read the issue now.

  • 5 Steps to Better Data Quality for Generative AI and Beyond

    Sponsored by: Dataiku

    Data quality is critical for successful Generative AI, but many organizations struggle with it. This white paper outlines 5 steps to improve data quality, including democratizing data quality efforts and embedding quality checks across operations. Read the full white paper to gain a competitive advantage through better data quality.

  • Unlocking AI’s Potential: Accelerating the AI Adoption Journey

    Sponsored by: Oracle

    As companies continue to implement AI, some have been experiencing a lack of quality data and skills as well as cost, security, and privacy concerns due to the AI they’ve implemented. So, what steps can you take to ensure that you can combat these challenges and accelerate your adoption? Dig into this guide to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.