ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly – 18 October 2016: Singapore aims to become a digital leader

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the city-state of Singapore is investing in skills and technology to become a leading digital nation. We examine how to prevent legacy IT becoming a hindrance to digital transformation. And we look at the impact of controversial new tax rules on the UK's IT contractor community. Read the issue now.

  • CW APAC: Tech career guide – women in IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.

  • CW Benelux - August-October 2022: Belgium seeks top tech talent

    Sponsored by: TechTarget ComputerWeekly.com

    The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.

  • Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.

  • Computer Weekly - 16 February 2021: How Covid-19 has hit IT salaries and job prospects

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our salary survey reveals the impact of the coronavirus pandemic on IT professionals' wages and job security. A potentially deadly cyber attack on a US water plant highlight the risks to critical infrastructure. And we find out how NHS Scotland is using tech to support its vaccine roll-out. Read the issue now.

  • CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL

    Sponsored by: TechTarget ComputerWeekly.com

    European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.

  • CIO Trends #8

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

  • Computer Weekly – 7 February 2023: Making IT security training stick

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.

  • Ransomware: Ongoing Challenges, and New Imperatives for IT and Business Leaders

    Sponsored by: Panzura

    Ransomware continues to impact organizations of all sizes, with the average number of monthly attacks growing 75%. Download this white paper to unlock insight into the state of ransomware security.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.