ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CW ANZ: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • The Case for Application Detection and Response (ADR)

    Sponsored by: Contrast Security

    This white paper explores the need for Application Detection and Response (ADR) to provide continuous protection and real-time visibility into application and API security. Learn how ADR can enhance your organization's security posture and fill the critical gaps left by traditional security measures. Read the full eBook.

  • Transforming Manufacturing with SASE

    Sponsored by: Cato Networks

    Discover how Secure Access Service Edge (SASE) can transform manufacturing by streamlining IT, enhancing security, and enabling secure global connectivity. Learn how leading manufacturers overcame challenges with SASE in this informative white paper.

  • Choosing the Best SASE Solution for Your Hybrid Workforce

    Sponsored by: Fortinet, Inc.

    With remote work here to stay, firms need flexible security for hybrid teams. Choose a single-vendor SASE for full protection, unified agent, secure access, SaaS security, variable pricing, cloud management, and hybrid deployment. For tips on picking and using the right SASE, see this white paper.

  • CW Middle East ezine July 2018

    Sponsored by: TechTarget ComputerWeekly.com

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

  • Why zero trust is IT security's best hope

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

  • CW Nordics August 2019: Copenhagen woos tech startups

    Sponsored by: TechTarget ComputerWeekly.com

    Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.

  • MicroScope: The digital transformation

    Sponsored by: MicroScope

    The phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.

  • Overcoming 3 Security Tool Challenges To Compliance

    Sponsored by: Cloudflare

    Compliance leaders are facing major challenges with shrinking budgets, reduced staff, and increasing costs. Meanwhile, legacy security solutions for compliance are proving to be costly, inefficient, and slow. Explore this ebook to discover insights on the top 3 compliance challenges of existing security approaches.

  • Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.