ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • January ezine: SD-WAN is taking off

    Sponsored by: MicroScope

    There has been plenty of talk about SD-WAN and the moment has arrived where the technology is making money for the channel

  • The State of Passwordless Authentication: Security and Convenience Drive the Change

    Sponsored by: OpenText

    This report examines passwordless authentication's rise, its security and user experience benefits, and industry concerns over phishing and credential attacks. Eliminating shared secrets is crucial. Discover how passwordless solutions can boost your organization's security and business results in this full white paper.

  • Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.

  • Enterprise Strategy Group (ESG): API security

    Sponsored by: Cequence

    As API usage grows, security must keep pace. This e-book explores the challenges of securing APIs, including common attacks and their business impacts. Discover the range of capabilities needed to protect APIs across the development lifecycle. Read the Enterprise Strategy Group (ESG) e-book to learn how to build a robust API security program.

  • Building AI You Can Trust

    Sponsored by: AWS & Source Allies

    Discover how to build trustworthy AI that delivers measurable business value. This white paper explores a proven approach using Metric-Driven Development and rigorous LLM evaluations. Learn how to create domain-specific AI solutions that differentiate your business. Read the full white paper.

  • Computer Weekly - 7 December 2021: Spy tech gets high tech – why MI6 invests in startups

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we're used to James Bond and his gadgets, but now MI6 is investing in tech startups to develop new intelligence capabilities. Our exclusive IT Priorities survey suggests IT leaders are optimistic about 2022. And our new buyer's guide examines the latest emerging technologies. Read the issue now.

  • Ai Security Testing Services

    Sponsored by: NCC Group

    Explore how to build cyber resilience in the age of AI. NCC Group's AI security testing services evaluate AI/ML systems for vulnerabilities like adversarial attacks, data poisoning, and model inversion. Get the white paper to learn how to secure your AI-driven environment.

  • Blockchain Enterprise Survey: deployments, benefits and attitudes

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.

  • Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.

  • The Value of Runtime Application with Self-Protection

    Sponsored by: Contrast Security

    Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.