Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
How generative AI is being applied across today’s leading industries
Sponsored by: AWSLeading organizations of every size and across every industry are leveraging AI to achieve various business results. See how 10 organizations are using AWS AI to improve customer experiences, augment human ingenuity, optimize business operations, and accelerate innovation. Get the eBook.
-
Hybrid Cloud Backup
Sponsored by: Veeam SoftwareTap into this Hybrid Cloud Backup for Dummies e-book to discover the importance of employing purpose-built backup and recovery for each of your environments, while retaining ownership of your data.
-
Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
Sponsored by: Schneider ElectricIn this paper, find out everything you need to know about Scope 3 emissions, and explore an inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
-
The Bot Ecosystem: Understanding And Mitigating Automated Threats
Sponsored by: Arkose LabsAs automated bot attacks escalate, securing digital experiences is critical. This e-book explores the bot ecosystem, attack vectors, and limitations of traditional mitigation. Learn a modern, layered approach to detect, classify, and respond to advanced threats while enhancing user trust. Read the full e-book.
-
3 STEPS TO DRIVE EMPLOYEE RETENTION AND BUSINESS GROWTH
Sponsored by: ServiceNowThe price of dissatisfied workers is high; Gartner estimates a company of 10,000 employees stands to pay $16 million per year replacing workers who leave in search of something better. This white paper by ServiceNow outlines three steps your organization can take to strengthen your workforce and drive growth. Explore the white paper now.
-
A Computer Weekly buyer's guide to API management
Sponsored by: TechTarget ComputerWeekly.comApplication programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
-
A Computer Weekly buyer's guide to post-Covid-19 supply chain management
Sponsored by: TechTarget ComputerWeekly.comThe supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.
-
CW Middle East – January 2017
Sponsored by: TechTarget ComputerWeekly.comIn this quarter's CW Middle East ezine, we look at how the Middle East, with the poorest road safety record in the world, could benefit most from self-driving cars.
-
Computer Weekly – 15 December 2020: How security will be different after Covid-19
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
-
CyberArk Vendor PAM Third-Party Privileged Access: Seamless. Efficient. Secure.
Sponsored by: CyberArkWith Vendor PAM, organizations can implement Zero Trust-based just-in-time access, biometric MFA, and privileged credential and session management without the need for VPN clients, passwords, and agents. Vendor PAM helps defend against attacks targeting 3rd-party access.