ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Cybersecurity in the era of generative AI

    Sponsored by: IBM

    Read this guide to learn how you can help your clients navigate the security landscape and tap into the resilience of generative AI to protect, prevent and secure their organization’s data, models, and applications.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • CIO Trends #9: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we take a look at how three banks in Finland are working together so they can free up resources that will help them keep pace with the tech changes in the industry. Also in this issue we look closely at the cloud first policy at shipping giant Maersk.

  • CIO Trends #9

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.

  • The Complete Secure Access Service Edge (SASE) Guide

    Sponsored by: Fortinet, Inc.

    This guide explores the Secure Access Service Edge (SASE) architecture, including how it differs from SD-WAN and security service edge (SSE). Learn about the benefits, challenges, and use cases of SASE to determine if it's the right choice for your organization. Read the full guide to understand this cloud-based network security model.

  • Computer Weekly –25 April 2017: Blockchain expands reach beyond finance

    Sponsored by: TechTarget ComputerWeekly.com

    Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.

  • Computer Weekly – 19 July 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

  • Cloud Services: The secret weapon for disrupting your business

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out how the cloud has levelled the playing field for Australian startups, why cloud services are beating IT departments and how one Australian bank is turning to the cloud to power its HR operations.

  • 5 challenges to EHR implementation and solutions overcoming them

    Sponsored by: XtelligentMedia Healthcare

    EHR implementation is no small feat, but being aware of common challenges can help prepare healthcare organizations for successful health IT deployments.

  • The Modern Application Development Playbook

    Sponsored by: Fastly

    Scaling, performance, and optimization represent big challenges in the development of modern applications. Serverless computing at the edge represents the first and only option that satisfies DevOps while allowing organizations to maintain the rapid pace of innovation. Download this eBook to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.