Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
The Cloud Influence on GRC
Sponsored by: TechTarget SecurityCloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
-
How to unlock the true value of data
Sponsored by: TechTarget ComputerWeekly.comWith a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.
-
Hyperconverged Reference Architecture
Sponsored by: PanduitIn this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.
-
How AI improves Predictive Maintenance
Sponsored by: TechTarget ComputerWeekly.comKone and ThyssenKrupp are using artificial intelligence to improve predictive maintenance of their lifts and escalators.
-
How AI improves Predictive Maintenance
Sponsored by: TechTarget ComputerWeekly.comKone and ThyssenKrupp are using artificial intelligence to improve predictive maintenance of their lifts and escalators.
-
GenAI: Empowering enterprises and engineering for the future
Sponsored by: VirtusaDiscover how generative AI (genAI) is transforming enterprises and engineering. Learn about leveraging GenAI to build new revenue streams, boost productivity, and enhance data engineering. Explore the enterprise readiness of AI tools and Virtusa's perspective on empowering the future. Read the white paper to learn more.
-
Cyber security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comAs organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
-
CW EMEA - April 2024: The blueprint for safe GenAI
Sponsored by: TechTarget ComputerWeekly.comIn the Netherlands, the government has formulated a vision document to guide its citizens and businesses on the safe and responsible use of GenAI.
-
Zscaler ThreatLabz State of Encrypted Attacks Report
Sponsored by: ZscalerEncrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
-
Russia's answer to Silicon Valley
Sponsored by: TechTarget ComputerWeekly.comThe Russian government is investing in an ambitious project to create its own technology hub that they hope will go on to rival Silicon Valley. The billions of rubles of government money being invested on the outskirts of Moscow has the backing of several multinational technology companies IBM, SAP, Intel, Cisco and Siemens.