ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • How generative AI is being applied across today’s leading industries

    Sponsored by: AWS

    Leading organizations of every size and across every industry are leveraging AI to achieve various business results. See how 10 organizations are using AWS AI to improve customer experiences, augment human ingenuity, optimize business operations, and accelerate innovation. Get the eBook.

  • Hybrid Cloud Backup

    Sponsored by: Veeam Software

    Tap into this Hybrid Cloud Backup for Dummies e-book to discover the importance of employing purpose-built backup and recovery for each of your environments, while retaining ownership of your data.

  • Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting

    Sponsored by: Schneider Electric

    In this paper, find out everything you need to know about Scope 3 emissions, and explore an inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.

  • The Bot Ecosystem: Understanding And Mitigating Automated Threats

    Sponsored by: Arkose Labs

    As automated bot attacks escalate, securing digital experiences is critical. This e-book explores the bot ecosystem, attack vectors, and limitations of traditional mitigation. Learn a modern, layered approach to detect, classify, and respond to advanced threats while enhancing user trust. Read the full e-book.

  • 3 STEPS TO DRIVE EMPLOYEE RETENTION AND BUSINESS GROWTH

    Sponsored by: ServiceNow

    The price of dissatisfied workers is high; Gartner estimates a company of 10,000 employees stands to pay $16 million per year replacing workers who leave in search of something better. This white paper by ServiceNow outlines three steps your organization can take to strengthen your workforce and drive growth. Explore the white paper now.

  • A Computer Weekly buyer's guide to API management

    Sponsored by: TechTarget ComputerWeekly.com

    Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    Sponsored by: TechTarget ComputerWeekly.com

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

  • CW Middle East – January 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Middle East ezine, we look at how the Middle East, with the poorest road safety record in the world, could benefit most from self-driving cars.

  • Computer Weekly – 15 December 2020: How security will be different after Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.

  • CyberArk Vendor PAM Third-Party Privileged Access: Seamless. Efficient. Secure.

    Sponsored by: CyberArk

    With Vendor PAM, organizations can implement Zero Trust-based just-in-time access, biometric MFA, and privileged credential and session management without the need for VPN clients, passwords, and agents. Vendor PAM helps defend against attacks targeting 3rd-party access.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.