ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • AV Comparatives: Top-Performance in Independent Testing

    Sponsored by: Bitdefender

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

  • The Business Value of Greenhouse

    Sponsored by: Greenhouse Software

    As the talent recruitment landscape continues to evolve at a breakneck pace, organizations must be able to keep up with the industry’s rapidly changing trends and expectations. Access this white paper to learn how you can best do so.

  • Multi-Factor Authentication Deployment Guide

    Sponsored by: Okta

    Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.

  • Managing Infrastructure At Cloud Scale

    Sponsored by: Red Hat

    As cloud adoption accelerates, managing the complexity of cloud infrastructure is a significant challenge. Learn how a consistent Linux platform like Red Hat Enterprise Linux can help you handle this complexity and realize the full benefits of cloud computing. Read the e-book now.

  • Managing Infrastructure At Cloud Scale

    Sponsored by: Red Hat

    This e-book explores how Red Hat Enterprise Linux (RHEL) provides a consistent, unified foundation to handle infrastructure complexity across on-prem, public cloud, and hybrid environments. Read the e-book now.

  • A Comprehensive Guide for Your Workforce Identity Maturity Journey

    Sponsored by: Okta

    Identity security was once simply a means of managing passwords and login credentials, but today, with identity at the heart of digital business, identity security is critical for protecting your organization. Download this white paper to unlock a comprehensive guide for your workforce identity maturity journey.

  • Anti-Fraud Technology Benchmarking Report 2024

    Sponsored by: SAS

    With fraudsters constantly looking for new ways to exploit technological change and human error to attack organisations, technology has become a crucial component of a successful anti-fraud program in 2024. Access this research content now to learn where you can improve upon your anti-fraud initiatives this year.

  • Jargon Buster Guide to Voice over IP (VoIP)

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

  • 2024 Recruiting Technology Trends Report

    Sponsored by: GEM

    This report from Gem and Lighthouse Research explores leading recruiting technology trends, including the growing importance of AI, the need to enhance candidate experience, and the benefits of data-driven decision-making. Learn how to leverage recruitment technology as a competitive edge in the full report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.