Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
The CIO’s Guide to Identity-Driven Optimization
Sponsored by: OktaFor a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.
-
CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink
Sponsored by: TechTarget ComputerWeekly.comThe Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.
-
The Ultimate Guide To Future-Proofing Your Voice Communications
Sponsored by: Sinch72% of IT decision-makers report that they didn’t feel as though their tech stack wasn’t prepared for the sudden switch to remote work, especially their voice communications systems. So, what are the best ways to future-proof your solutions? Access this guide to learn more.
-
Can’t Choose Between Public And Private Cloud? You Don’t Have To With IaaS
Sponsored by: FCNIn this Forrester report, discover why organizations are adopting infrastructure-as-a-service (IaaS), the features they consider essential in an IaaS model, and the business benefits that such a model can deliver.
-
9 essential elements of network security
Sponsored by: TechTarget ComputerWeekly.comNetwork security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
-
How to enhance your network for the future
Sponsored by: TechTarget ComputerWeekly.comThe world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
5G: APAC guide to next-gen mobile connectivity
Sponsored by: TechTarget ComputerWeekly.comFrom efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
-
A Computer Weekly buyer's guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
MicroScope – September 2023: Channel pushes on against the odds
Sponsored by: MicroScopeIn this issue, we take a look at the struggles and triumphs faced by the channel this year so far. Also read up on possible solutions to the skills shortage, including the opening up of STEM to a more diverse range of students, and the necessity for improving skills on the job.