Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Top 10 datacentre stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThere is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.
-
The State of Zero Trust Security 2023
Sponsored by: OktaIn partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.
-
Top Health IT Analytics Forecasts and Goals for the Coming Year
Sponsored by: XtelligentMedia HealthcareHealth IT analytics and artificial intelligence experts say that healthcare organizations should focus on AI governance, transparency, and collaboration in 2024.
-
CVE-2021-2035 and RDBMS Scheduler Security
Sponsored by: Spinnaker SupportThis white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.
-
10 AI and machine learning use cases in ITSM
Sponsored by: TechTarget ComputerWeekly.comAI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM
-
Powerful, Application-aware Investigation Tools.
Sponsored by: EndaceWhen you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
-
Webinar Series for ABM: An 8-Step Planning Framework
Sponsored by: BrightTALK by TechTargetAccount-based marketing (ABM) has become a popular strategy within the B2B tech space, especially as B2B marketers look to better align with the way Sales operates. Yet some argue that ABM program success has been mixed or even underwhelming at times. Access this e-book to learn more.
-
Digital identity strategies to enhance data privacy and protect networks
Sponsored by: TechTarget ComputerWeekly.comThe rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
-
Computer Weekly - 14 December 2021: The rules for a safer internet
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
-
Sustainability at the Edge
Sponsored by: Schneider ElectricThere is a yawning gap between enterprise perceptions and sustainability initiative realities. So how can your organization bridge the gap? Find out in this research report.