ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CW APAC – Tech career guide: Software development

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at what it takes to land a career and thrive in the fast-moving world of software development

  • How Graph Databases Help Solve Security Vulnerabilities in SBOMs

    Sponsored by: Amazon Web Services

    Software bills of material (SBOMs) are foundational to risk management and cybersecurity. In this white paper, expert-level analysts from TechTarget’s Enterprise Strategy Group (ESG) explore the methodologies Amazon Neptune and Intuit use to secure a software bill of materials (SBOM). Read on to learn more.

  • Solution Brief Cloud Migration Services

    Sponsored by: AWS & nClouds

    In this solution brief, you'll discover how you can migrate workloads to the cloud with nClouds' deep AWS migration expertise. Read on now to learn how you can leverage their certified skills, proven processes, and automation to accelerate your cloud migration while minimizing disruption and cost.

  • Evolve Faster Than the Threat

    Sponsored by: Sonatype

    This white paper examines cyber threats to software supply chains and open source components, noting the increased attack surface due to third-party code use. It recommends automating open source governance in the development lifecycle to mitigate risks. Read the white paper here.

  • The rise of the MSSP

    Sponsored by: MicroScope

    In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.

  • Secure Efficient and Flexible Capacity Tier for Veeam Backups

    Sponsored by: DataCore Software Corporation

    PH

  • CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients

    Sponsored by: TechTarget ComputerWeekly.com

    An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.

  • A Buyer’s Guide to Modern Virtualization

    Sponsored by: Pure Storage

    In this buyer’s guide to modern virtualization, you’ll find out why storage is key for establishing a virtualization strategy that is built for the future. Read on now to discover how a unified storage platform can help your business minimize disruption and unlock innovation in the face of change.

  • Securing DevOps

    Sponsored by: Veracode, Inc.

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

  • The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives

    Sponsored by: Red Hat

    In this IDC report, The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives, you’ll learn about the financial and business benefits of using Red Hat solutions. Highlights from the report include:540% three-year ROI23% faster development lifecycle for new apps52% faster security updatesRead the IDC report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.