Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
CW APAC: Trend watch: Enterprise resource planning
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.
-
Computer Weekly – 30 January 2018: Davos debates global tech risks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
-
Fortify Your Enterprise With Modern Security
Sponsored by: FCNReview this white paper to discover the 3 pillars of Dell’s holistic approach to modern security.
-
Building a Modern Educational IT Network
Sponsored by: Auvik Networks, Inc.In this 16-page e-book, unlock recommendations for IT management in educational institutions.
-
In 2017, the insider threat epidemic begins
Sponsored by: TechTarget ComputerWeekly.comCyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
Proactive Security: Software vulnerability management and beyond
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
A Computer Weekly buyer's guide to blockchain technology
Sponsored by: TechTarget ComputerWeekly.comBlockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
-
How to Choose a Background Check Provider for Hiring at Scale
Sponsored by: CheckrIn a tight labor market, choosing the wrong background screening provider could be a costly mistake. This guide shares five ways the best background check partner can help you get ahead in your hiring market—plus the questions you need to ask and must-have solutions when choosing a provider.
-
Gain a Competitive Edge with Evergreen//One
Sponsored by: Pure StorageUnlock the power of cloud economics with Evergreen//One, an enterprise-grade Storage-as-a-Service solution. Gain a competitive edge with high performance, uptime, and energy efficiency. Read the product overview to learn how Evergreen//One could transform your sustainable data storage strategy.
-
Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce
Sponsored by: ZscalerThis in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.