Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
Sponsored by: Schneider ElectricIn this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
-
A Computer Weekly buyer's guide to NoSQL
Sponsored by: TechTarget ComputerWeekly.comThere's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
-
Cybersecurity in the era of generative AI
Sponsored by: IBMRead this guide to learn how you can help your clients navigate the security landscape and tap into the resilience of generative AI to protect, prevent and secure their organization’s data, models, and applications.
-
Focus: Women in IT
Sponsored by: TechTarget ComputerWeekly.comDiversity has been an issue in the IT industry for a long time, and the number of women choosing IT for a career has been stagnant over the last few years.
-
Computer Weekly - 8 September 2020: NHS whistleblowers at risk due to poor IT policies
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our investigation into NHS practices shows how poor IT policies are putting whistleblowers at risk. Our buyer's guide examines the networking implications of the surge in remote working. And we assess how well the public cloud giants responded to the demands of the coronavirus pandemic Read the issue now.
-
Security analytics: Enabling organisations to get ahead of attackers
Sponsored by: TechTarget ComputerWeekly.comIn the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
-
CIO Trends #9: Nordics
Sponsored by: TechTarget ComputerWeekly.comIn this issue we take a look at how three banks in Finland are working together so they can free up resources that will help them keep pace with the tech changes in the industry. Also in this issue we look closely at the cloud first policy at shipping giant Maersk.
-
Computer Weekly – 25 July 2017: How the DVLA is making driving digital
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we hear from the DVLA about how it is becoming a digital hub for motoring and moving away from its legacy IT. Our latest buyer's guide examines the future of data management. And we look at the importance of understanding the small print in your software licensing agreements. Read the issue now.
-
The Complete Secure Access Service Edge (SASE) Guide
Sponsored by: Fortinet, Inc.This guide explores the Secure Access Service Edge (SASE) architecture, including how it differs from SD-WAN and security service edge (SSE). Learn about the benefits, challenges, and use cases of SASE to determine if it's the right choice for your organization. Read the full guide to understand this cloud-based network security model.
-
CIO Trends #9
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.