ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Computer Weekly – 12 July 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we explore the many ways Watson has evolved from the machine that bettered humans in Jeopardy! to providing deep analytical insights to solve real world crises. We also look at how Barclay's bank is using DevOps to remain competitive and reveal new research that illustrates why cloud computing is at the heart of business innovation.

  • From fraud detection to protection

    Sponsored by: Teleperformance

    Any company that stores sensitive information is at risk for fraud. Whether it’s financial or personal data, if you have it, there is a good chance someone is trying to get at it. This problem is compounded even more with remote work and the rise of AI. All of this means it’s time to rethink your fraud prevention posture. Read on to learn more.

  • Critical Gaps in Securing Identities

    Sponsored by: CyberArk

    There are significant challenges in securing applications that sit outside of the protections offered by SSO and MFA. Learn in this report, which surveyed senior cybersecurity professionals, how they are approaching these access security challenges and their best practices.

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

  • 10 Properties Of Secure Medical Systems

    Sponsored by: Wind River

    This white paper outlines 10 key security principles for designing secure medical systems, including data encryption, secure boot, hardware partitioning, and input validation. Implementing these principles can help protect against cyberattacks and safeguard patient health. Read the full white paper to learn more.

  • Authentication After Passwords

    Sponsored by: Okta

    The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.

  • Who will win the world's biggest cloud contract?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • Data Modeling Guidebook

    Sponsored by: HighByte

    Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.

  • Top 10 cloud stories 2018

    Sponsored by: TechTarget ComputerWeekly.com

    While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.

  • Top 10 ASEAN IT stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.