Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
The Real Value Of Technology Connectivity
Sponsored by: TeamViewerThis report explores how technology connectivity drives business benefits like improved efficiency, collaboration, and innovation. It finds that seamless connectivity remains elusive for most organizations, with 95% having gaps to close. Read the full report to learn how to maximize the value of technology connectivity.
-
E-government benchmark 2016
Sponsored by: TechTarget ComputerWeekly.comThe results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
-
Information Security and Compliance Future Trends 2024
Sponsored by: CloudflareExplore how regulation, sophisticated attacks, and AI will shape security spending in the near future. Learn about the latest trends in API security, data privacy, identity management, and more. Download this comprehensive analyst report to stay ahead of the evolving cybersecurity landscape.
-
Computer Weekly - 10 September 2024: The flight to data success
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.
-
A reference architecture for the IoE
Sponsored by: TechTarget ComputerWeekly.comAnalyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).
-
Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.
-
Top 10 Policies Every IT Compliance Certification Requires
Sponsored by: Scalepad SoftwareA key factor in job satisfaction is eliminating manual, tedious tasks—like backup monitoring—so your team can focus their efforts on projects of greater business value. Download this white paper to view 5 tangible benefits of automated backup monitoring, applicable to your organization, MSPs, and others.
-
Computer Weekly – 7 November 2017: The ethics of software development
Sponsored by: TechTarget ComputerWeekly.comTake a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
-
Akamai Guardicore Segmentation PCI DSS Whitepaper
Sponsored by: Akamai TechnologiesA new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.
-
Top Priority IT Tasks: Risk Management and Regulatory Compliance
Sponsored by: Dell SoftwareIn this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.