ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly – 28 April 2020: Is digital transformation in the public sector making progress?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we assess the progress of digital transformation across the public sector. IT contractors face a double-whammy from backdated tax payments and loans being recalled – we explore the growing scandal. And we assess the benefits of computational storage. Read the issue now.

  • A Computer Weekly Buyer's Guide to Enterprise social networking

    Sponsored by: TechTarget ComputerWeekly.com

    Companies are discovering the many advantages of communicating through social networking platforms. In this 14-page buyer's guide, Computer Weekly looks at how they can revolutionise collaboration, the options available for retailers and the pitfalls of communication overload

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

  • CW Benelux ezine February 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • Computer Weekly - 2 March 2021: The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and talk to this year's winner, NHS Digital CEO Sarah Wilkinson, about an unprecedented year of challenges. Also, we examine the best software patching strategies and see how the pandemic has affected women in tech. Read the issue now.

  • CW Europe - March-May 2022: Luxembourg sees big role in global fintech market

    Sponsored by: TechTarget ComputerWeekly.com

    Read about Luxembourg's aim to play a larger role in the rapidly growing global financial technology market. Also find out how a Siri-like digital assistant will automate the completion of government service requests in Estonia.

  • CW Middle East - October-December 2022: Qatar strengthens cyber defences ahead of FIFA World Cup

    Sponsored by: TechTarget ComputerWeekly.com

    Being the first Arab country to host the World Cup is pressure enough on Qatar, but there is also a massive cyber security challenge associated with any event of this magnitude. Read about its preparations. Also in this issue, find out about the unique challenges of hiring IT professionals in Saudi Arabia.

  • Computer Weekly – 2 October 2018: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology, and talk to this year's winner, Code First:Girls CEO Amali de Alwis, about the challenges of achieving diversity in IT. Also, our latest buyer's guide looks at the future of collaboration software. Read the issue now.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.