ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • The Cloud Influence on GRC

    Sponsored by: TechTarget Security

    Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.

  • CW EMEA - April 2024: The blueprint for safe GenAI

    Sponsored by: TechTarget ComputerWeekly.com

    In the Netherlands, the government has formulated a vision document to guide its citizens and businesses on the safe and responsible use of GenAI.

  • MicroScope – November 2022: Elevate security to minimise risk

    Sponsored by: MicroScope

    Security remains a major concern for customers and a continuing area of growth for the channel – so what can managed service providers do to help out? Also read about expectations for the last quarter of 2022 and how partnerships are key to digital transformation.

  • McAfee Labs Threats Report

    Sponsored by: McAfee

    Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.

  • How Conversational AI Can Significantly Improve Customer Experience In The Financial Services Industry

    Sponsored by: Boost.ai

    Conversational AI can significantly improve customer experience in the financial services industry by automating routine inquiries, enabling 24/7 support, and gathering valuable customer feedback. Learn how leading banks are putting conversational AI into practice - read the full white paper.

  • State of 2023 Data Science AI Aakes Center Stage

    Sponsored by: Anaconda

    This in-depth report examines the state of the global data science community, including insights on generative AI, open-source software, and delivering business value. Get the full report now to explore the latest trends shaping the future of data science.

  • Cyber security in the Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • GEP Spend Category Outlook 2024

    Sponsored by: GEP

    As it’s clear that the challenges plaguing the supply chain will not be going away any time soon, procurement must come up with ways that they can leverage new technology to combat these issues. But of these tools, which are the most effective? Browse this report to learn more.

  • Business analytics needs underpinnings of sound data and data-skilled humans

    Sponsored by: TechTarget ComputerWeekly.com

    Data analytics for the solution of first-order business problems is probably more important than ever. It is not new. Companies and organisations have been analysing computerised data for many decades. But all sorts of companies now pronounce themselves "data driven". Read more about business analytics trends in this exclusive e-guide.

  • Modernizing the Mainframe While Preserving IT Investments and Managing Risk

    Sponsored by: Ensono Limited

    Fragmented data, exceeded budget, data risk—these are 3 challenges common to mainframe modernization. To avoid these challenges and facilitate a smooth transformation, many organizations utilize a tool or service. One such service is Application Migration Methodology (AMM). Read this white paper to understand AMM’s 5 steps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.